1.3 Application Attacks Flashcards

1
Q

Priviledge Escalation

A

attacks seek to increase the level of access that an attacker has to a target system. They exploit vulnerabilities that allow the transformation of a normal user account into a more privileged account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cross-site scripting

A

These occur when web applications allow an attacker to perform HTML injection, inserting their own html code into a webpage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Injections

A

This is an attack that attackers use in order to break through a web application and gain access to the systems supporting that aplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQL injection

A

An attacker is able to provide input to the web application and then monitor the output of that application to see the result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic link library

A

Malware triesd to inject code into the memory process space using a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lightweight directory access protocol

A

Users input is not properly filtered and the return can be executed commands etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Markup Language (XML)

A

This is where attackers embed code in extensible markup language documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pointer/object dereference

A

These are simply an area of memory that stores an address of another location in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Directory traversal

A

This is when a web server suffer from a security misconfiguration that allows users to navigate the directory structure and access files that should remain secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer overflows

A

These occur when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Time of check/time of use

A

This is a race condition that occurs when a program checks access permissions too far in advance of a resource request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Error handling

A

This is when developers of code step in and handle security risks before an attacker can do their attacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Improper input handling

A

These can expose applications to injection attacks, XSS and other exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Replay attack

A

an attempt to reuse authentication requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Integer overflow

A

This is where the result of an arithmetic operation attempts to store an integer that is too large to fit into the specified buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Request forgeries

A

These exploit trust relationships and attempt to have users unwittingly execute commands against a remote server.

17
Q

server-side

A

These attacks trick a server into visiting a URL based on user-supplied input.

18
Q

cross-site

19
Q

Application programming interface (API) attacks

A

These allow anyone with knowledge of the API URL’s to modify a service. Make sure there is end to end encryption with API’s: HTTPS

20
Q

Resource exhaustion

A

Systems may consume all of the memory, storage, processing time, or other resources available to them, rendering the system disabled or crippled from other uses.

21
Q

Memory leak

A

This is when an application fails to return some memory that it no longer needs, perhaps by losing track of an object that it has written to a reserved area of memory.

22
Q

Secure Sockets Layer (SSL ) stripping

23
Q

Driver manipulation

A

When an attacker convinces a user to install a malicious driver on their computer, and then the attacker can gain complete control of the system

24
Q

Shimming

A

This takes a legit driver and wraps a malicious driver around the outside of it

25
Refactoring
If an attacker has access to the driver's source code, they can modify it to also include malware elements.
26
Island hopping attack
Compromising vulnerable vendors in the supply chain and then attempt to attack the target organization.