1.3 Given a scenario, analyze potential indicators associated with application attacks. Flashcards

1
Q

Cross-site(Client Side) Request Forgery (XSRF)

A

XSRF is an attack that exploits a user’s active session with a web application. It tricks the victim into executing an unwanted action, typically by clicking on a malicious link.
A Cross-site request forgery (XSRF) is a malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser. This is successful if the server does not check if the user made the request.
allows an attacker to induce a victim user to perform actions that they do not intend to. “One way” attack, attacker cannot see the response only send commands like move money from 1 bank account to another. Needs to already have an established session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stored Cross-Site Scripting (XSS)

A

Stored XSS attacks involve an attacker injecting a malicious script directly into a website that is stored and served to users. Unlike a reflected XSS attack, which executes on the server, a stored XSS attack executes on the user’s browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Document Object Model (DOM)-based XSS

A

DOM-based XSS attacks involve an attacker manipulating the structure of an HTML page using client-side scripting. The malicious payload is typically embedded within the page itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reflected Cross-Site Scripting (XSS)

A

A reflected XSS attack occurs when a web application echoes user-supplied data without proper sanitization. In this case, the attacker’s email links to a malicious website. Once clicked, it injects malicious code into the victim’s browser, which executes and changes the password on a legitimate website. “Two way” attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Server-side request forgeries(SSRF)

A

Server-side request forgeries (SSRF) causes the server application to process an arbitrary request that targets another service, either on the same host or another.
A server-side request forgery abuses the functionality and services of backend servers to read and update internal resources. This can expose, for example, database information, even without an authenticated session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application programming interface intrusions

A

Application programming interface (API) intrusion occurs when an attacker takes advantage of unsecure communication with application services to perform denial of service attacks using multiple API calls, for example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure socket layer stripping

A

Secure socket layer (SSL) stripping is an On-path attack using ARP poisoning that redirects clients to an HTTPS site in an unsafe way when attempting an HTTP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Directory traversal

A

Directory traversal occurs when the attacker gets access to a file outside the web server’s root directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transitive access

A

Transitive access describes the problem of authorizing a request for a service that depends on an intermediate service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privilege escalation

A

Privilege escalation is the practice of exploiting flaws in an operating system or other application to gain a greater level of access than intended for the user or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP injection

A

A lightweight directory access protocol (LDAP) injection occurs when an attacker exploits a client’s unauthenticated access to submit LDAP queries that could create or delete accounts, even change authorizations and privileges. LDAP uses port 389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XML injection

A

An extensible markup language (XML) injection attack occurs when submitted XML data takes advantage of spoofing, request forgery, and injection of arbitrary code. The XML had no encryption or input validation checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DLL injection

A

A dynamic link library (DLL) injection is a vulnerability that causes the operating system to allow one process to attach to another and then forces it to load a malicious link library.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Refactoring

A

Refactoring means the code performs the same function by using different methods. Refactoring means that the antivirus software may no longer identify the malware by its signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shimming

A

Shimming is the process of developing and implementing additional code between an application and the operating system to enable functionality that would otherwise be unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Race condition

A

A race condition occurs when the outcome from an execution process is directly dependent on the order and timing of certain events.

17
Q

SYN Attack

A

SYN attacks cause resource exhaustion on the host’s processing requests, consuming CPU cycles, and memory. This delays the processing of legitimate traffic and could potentially crash the host system completely.
Resource exhaustion, Amplification, and DoS

18
Q

shim

A

A shim is a code library that intercepts and redirects calls to enable legacy mode on a system. The shim database represents a way that malware with local administrator privileges can run on reboot (persistence).

19
Q

amplification attack

A

Type of SYN flood attack where the adversary spoofs the victim’s IP address and attempts to open connections with multiple servers.