Sie sind auf Seite 1von 2

CEH Study Guide Chapter 5

Study online at quizlet.com/_5rfwn


1.

Define a Trojan?

malicious program disguised as something benign - inmany cases appears to perform desirable functions for the user but actually allows hackers access to the system. program or set of related programs that a hacker installs on a target system to allow access to the system at a later time. software packages that can be used to deliver a Trojan - the wrapper binds legitimate file to the Trojan - both are combined into a single executable and installed when the program is run. let's an attacker access a machine on the internal network from the outside - the internal system tries to access the external master to pick up commands.

13.

What are some common Trojan programs and ports?

2.

Define backdoor? Define what a wrapper is? Describe how a reverseconnecting trojan works: Describe overt and covert channels:

BackOrifice: UDP 31337 or 31338 Deep Throat: UDP 2140 and 3150 NetBus: TCP 12345 and 12346 Whack-a-Mole: TCP 12361 and 12362 NetBus 2: TCP 20034 Girlfriend: TCP 21544 Master's Paradise: TCP 3129, 40421, 40422, 40423, and 40426 Remote Access Trojan (RAT): used to gain remote access to a system Data-Sending Trojan: used to find data on a system and deliver data to a hacker Destructive Trojan: used to delete or corrupt files on a system Denial-of-Service Trojans: Used to launch DoS attacks Proxy Trojans: used to tunnel traffic or launch hacking attacks via other systems FTP Trojans: used to create an FTP server in order to copy files onto a system Security Software Disabler Trojan: used to stop antivirus software sigverif: check to see what files Microsoft has digitally digned on a system Ssytem File Checker (sfc): command-line tool used to check whether a Trojan program has replaced files. 1. Polymorphic Viruses: encrypt code in a different way with each infection and can change to avoid detection. 2. Stealth Viruses: hide normal virus characteristics such as modifying the original date and time stamp. 3. Fast and Slow Infectors: evade detection by infecting very quickly or very slowly. 4. Sparse Infectors: infect only a few systems or applications 5. Armored Viruses: are encrypted to prevent detection 6. Multipartie Viruses: Advanced viruses create multiple infections 7. Cavity Viruses: attach to empty areas of files. 8. Tunneling Viruses: sent via a different protocol or encrypted to prevent detection and allow passage through firewall 9. Camouflage Viruses: appear to be another program 10. NTFS and AD Viruses: attack NTFS or AD in Windows systems System file checker used to check if files have been replaced; if it has, retrieves a good copy from Windows\system32\dllcache folder.

3.

14.

What are some common types of Trojans?

4.

5.

Overt channels are the normal legitimate way that programs communicate within a computer system. Covert channels use programs or communication paths in ways that were not intended. signature verification checker that compares results to running processes to see what files are digitally signed by Microsoft on the system. infects another executable and uses this carrier program to spread itself - examples include macros, games, email attachments. similar to a virus but does not need a carrier program - a worm can self-replicate and move from infected host to another host. embedded in a malicious Trojan.

15.

6.

Describe what sigverif does? Explain what a virus is? Explain what a worm is? How are backdoors installed? How are RATs different from normal backdoors? How are viruses classified? How does the Netcat Trojan work?

What are some utilities to do system file verification? What are the categories of viruses?

16.

7.

8.

9.

10.

They hook themselves into the operating system and always come packages with two files: client file and server file. Server file is installed on the victim machine and client file is installed on the attackers. 1. According to what they infect. 2. According to how they infect. uses command-line interface to open TCP or UDP ports on a target system - a hacker can then telnet to those open ports and gain shell acess.

11.

12.

17.

What does sfc /scannow do?

18.

What is a remote access trojan (RAT)? What is meant by tunneling? What is the most common method for disguising backdoors?

class of backdoors used to enable remote control over a compromised machine. technique which allows one protocol to be carried over another one. adding a new service in the Windows operating system.

19. 20.

Das könnte Ihnen auch gefallen