Application Based Vulnerabilities Flashcards

1
Q

Injection Attacks (Application Vulnerabilities)

A
  • insertion of additonal code or information via a data input from a client to the application
  • most common through SQL, but can also be HTLM, command or code - preventable through input validation and least privilege for databases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SQL Injection (Application Vulnerabilities)

A
  • injectinon of SQL commands, specific injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication (Application Vulnerabilities)

A
  • credential brute forcing
  • session hijacking - attacks web session control mechanism by taking over a session by guessing session token
  • redirect - sends user to malicious page
  • default credentials
  • weak credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kerberos Authentication (Application Vulnerabilities)

A
  • kerberos is a system of tickets that grant devices permission to communicate over a non secure network and ID themselves
  • golden ticket - Kerberos ticket granting ticket TGT, can be used to access any kerberos service
  • silver tickets - kerberos TGT, can be used for a specific kerberos service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Parameter Pollution - Authorization (Application Vulnerabilities)

A
  • HTTP parameters are modified in order to conduct malicious attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insecure Direct Object Reference - Authorization (Application Vulnerabilities)

A
  • app provides direct access to an object based on user supplied input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cross Site Scripting XSS (Application Vulnerabilities)

A
  • attacker embeds malicious scripting commands on a trusted website, target is the user
  • stored/persistent - data provided by attacker is saved on server
  • reflected - non persistent, activated through link on site
  • DOM - Document Object Model DOM is vulnerable, victims browser is exploited (client side XSS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cross Site Request Forgery CSRF (Application Vulnerabilities)

A
  • attacker forces user to execute actions on web server which they authenticated, cannot see web servers response but this can have the victim transfer funds, change passwords and more
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clickjacking (Application Vulnerabilities)

A
  • uses multiple transparent layers to trick a user into clicking on a button or link on a page when they were intending to click on the actual page, hyperlinks concealed under legit clickable content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Misconfiguration (Application Vulnerabilities)

A
  • attacks rely on app or server using insecure settings
  • Directory traversal - allows access to restricted directories and for command execution outside of webservers root directory
  • Cookie Manipulation - DOM based cookie manipulation that allows a script to write data into the value of a client stored cookie
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

File Inclusion (Application Vulnerabilities)

A
  • includes a file into targeted application by exploiting a dynamic file inclusion mechanism, usually due to lack of input validation
  • Local - ../../uploads/malware.exe
  • remote - https.www.xyz.com/malware.exe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Insecure Code Practices (Application Vulnerabilities)

A
  • commends in source code,
  • lack of error handling
  • verbose error handling
  • hard coded credentials - credentials are wirtten in source *code instead of inclusion file
  • race conditions
  • unauthorized use of function/unprotected API
  • hidden elements
  • lack of code signing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly