1.3 potential indicators associated with application attacks Flashcards

1
Q

Cross-site scripting

A

XSS
attacker injects malicious executable scripts into the code of a trusted application or website. Initiated by email.
scripts run in user input boxes and steals info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SQL Injection

A

malicious SQL code for backend database manipulation to access information that was not intended to be displayed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DLL injection

A

Dynamic-link library in Windows
A DLL is a file type that contains code, data, and resources that can be shared among multiple programs

DLL injection is often used by external programs to influence the behavior of another program in a way its authors did not anticipate or intend.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LDAP injection

A

Lightweight Directory Access Protocol
manipulates Active Directory application results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

XML injection

A

Extensible Markup Language
Stores, transmits, and reconstructs data. It’s a set of rules for encoding documents in a format for humans and machines.
Manipulates XML application or document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pointer/object dereference

A

the process of accessing the value stored at the memory address pointed to by the pointer. This allows you to work with the actual data rather than just the memory location.

A null pointer dereference can lead to program crashes and other unpredictable behavior. It can also allow a local user to crash the system or potentially cause a denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Race conditions

A

Time of check/time of use TOCTOU
something happens between TOC and TOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replay attack

A

a type of network attack in which an attacker captures a valid network transmission and then retransmit it later. The main objective is to trick the system into accepting the retransmission of the data as a legitimate one.

use salt or encryption to avoid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integer overflow

A

Inserts a number that is too large which causes memory to crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API attacks

A

an attempt by a malicious actor to gain unauthorized access to an API to break into a system or network, or transfer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Memory leak

A

use all available memory to crash system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Driver shimming

A

filling space between old application and different windows versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pass the hash

A

attacker captures a password hash (as opposed to the password characters) and then passes it through for authentication and lateral access to other networked systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sidejacking

A

UNSECURED WIFI EAVESDROPPING

attacker intercepts and steals sensitive information, such as login credentials, by eavesdropping on communication between two parties. This often occurs on unsecured Wi-Fi networks, allowing the attacker to “sidejack” the session and gain unauthorized access to accounts or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSRF

A

Server-side request forgery
a web security vulnerability that allows an attacker to make requests from a server to unintended locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DHCP starvation

A

flood network with ip addresses
DHCP runs out of addresses

17
Q

ASLR

A

Address Space Layout Randomization

computer security technique that randomizes the location of key data areas in a process’ address space. This makes it more difficult for attackers to perform buffer overflow attacks.

18
Q

Buffer Overflow

A

a program attempts to write more data to a buffer than it can hold. A buffer is a temporary storage area. DDoS, system crashes, attempt system takeover.

19
Q

refactoring driver

A

unique metamorphic malware that cannot be caught by antivirus