1.3 Application Attacks Flashcards

1
Q

This type of attack involves gaining higher-level access to a system by exploiting a vulnerability or design flaw.

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This type of attack is the most common attack carried out on web pages. Involves the injection of javascripts into a webpage in order to carry out malicious scripts, capture entered information, or display messages.

A

Cross Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This type of XSS attack involves scripts running as input, which then get returned to the user and executed on the victim machine. Can also be a URL hyperlink in an email that runs the script when the victim click the link in the email.

A

Non-persisten (reflected)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This XSS attack type is kept stored in a database or web server, allowing a script to be ran against every user who accesses the targeted webpage. There is no specific target involved.

A

Persistent (stored)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This type of attack is often the result of bad programming by not handling input/output correctly. Involves an attacker inserting their own information into a data stream.

A

Injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This type of injection attack focuses on modifying the requests going into a relational database in order to perform malicious queries.

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These two injection types will modify data transfer and storage requests, and manipulate the results of directory access requests.

A

XML and LDAP Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This type of injection attack involves the manipulation of dynamic-link library code that can unintentionally run programs or applications.

A

DLL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This type of attack involves overwriting the memory buffer in order to cause data to spill over into other memory areas. Can cause DoS and allow a system to be compromised. Complex exploit that can be repeatable.

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This type of attack involves capturing useful information from network traffic and then send the data back out across the network in order to appear as the person they captured the info from.

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This type of replay attack involves an attacker capturing a password hash being transported over the network and then passes it on to the server as its own request in order to gain authentication.

A

Pass the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This happens when an attacker uses headers, browser cookies, or any captured network traffic in order to take over the target’s trusted session with a website.

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of request forgery is often known as a one-click attack and takes advantage of the inheirent trust between the website and your browser. Often sent as a hyperlink in an email with the request in it that runs when clicked.

A

Cross site request forgery (XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This type of forgery eliminates the need for a client and allows an attacker to perform requests to a web server on behalf of the attacker. Often caused by bad programming practices.

A

Server Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of attack utilizes the trust between your OS and your PC hardware.

A

Driver Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This driver manipulation technique involes inserting a shims to circumvent security on a system.

A

Shimming

17
Q

This process creates metamorphic malware that can appear differently each time it is loaded. It is very difficult to track using signature-based malware detection.

A

Refactoring

18
Q

This type of attack in on-path and is carried out by an attacker where they sit in the middle between a victim and server and downgrade the session from TLS to SSL.

A

SSL Stripping

19
Q

This scenairio involves processes happening simultaneously that can cause malfunctions in a program.

A

Race Condition

20
Q

This is what it is called when unused memory on a system is not properly released and continues to grow in size until there is no memory left on a system.

A

Memory leak

21
Q

This type of vulnerability is exploited by pointing portions of memory to empty space that can cause bugs and application crashes.

A

Null pointer dereference

22
Q

This is what it is called when an attacker is able to gain access to unauthorized directories by utilizing the .\ command

A

Directory Traversal

23
Q

Why should errors be handled properly when programming?

A

They can display system info useful to attackers

24
Q

This type of attack invovles the attacker exploiting vulnerabilities in the application programming interface.

A

API Attacks

25
Q
A