02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Malware 191<br />

A Closer Look at Slammer<br />

At the peak of its activity, Slammer was doubling the number of infected systems every<br />

8.5 seconds. This heretofore unheard-of replication rate was 250 times faster than that of<br />

the previous record holder, Code Red.<br />

Slammer was able to spread so quickly thanks to a number of factors related to how it<br />

was constructed and the environment into which it was deployed. Many systems were<br />

left unpatched, despite the availability of a fix, resulting in a fertile environment for<br />

exploitation. Many routers on the Internet buckled and crashed under the intense traffic<br />

that resulted from the worm. As a result of routers failing, traffic was rerouted, and<br />

routing tables updated on other routers, which resulted in additional failures. Finally, the<br />

entire worm (376 bytes) could be contained within a single User Datagram Protocol (UDP)<br />

packet, allowing it to quickly replicate and be sent to other victims.<br />

The Functioning of Computer Worms<br />

Worms are an advanced form of malware, compared to viruses, and have different goals<br />

in many cases. One of the main characteristics of worms is their inherent ability to<br />

replicate and spread across networks extremely quickly, as the previous Slammer example<br />

demonstrated. Most worms share certain features that help define how they work and what<br />

they can do:<br />

■ Do not require a host application to perform their activities<br />

■ Do not necessarily require any user interaction, direct or otherwise, to function<br />

■ Replicate extremely rapidly across networks and hosts<br />

■ Consume bandwidth and resources<br />

Consuming bandwidth and resources may or may not indicate a worm.<br />

Any such slowdown needs to be investigated further to determine if it is<br />

caused by a worm.<br />

■<br />

■<br />

Worms can also perform some other functions:<br />

Transmit information from a victim system back to another location specified by the<br />

designer.<br />

Carry a payload, such as a virus, and drop off this payload on multiple systems rapidly.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!