2: 3 Application Attacks Flashcards

1
Q

OWASP

A

Open Web Application Security Project: maintains a top 10 application security list that all sec professionals should be aware of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Injection Flaws

A

insert unwanted code that a website will then run, SQLInjection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SQL

A

Structured Query Language - request data from database that applications often use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQLInjection

A

Changes to SQL that can change the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ways to protect against Injection Flaws

A

Input Validation, Parameterized SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Broken Authentication

A

Flaws in a websites authentication process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive Data Exposure

A

discloses confidential information to the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Broken Access Controls

A

Provides unauthorized access, insecure Direct Object References
Manually brute forcing IDs when they shouldn’t be able to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Misconfigurations

A

Can jeopardize systems - web servers, application servers, firewalls, other components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XSS

A

Cross Site Scripting - Scripts embedded in 3rd party system that executes in browser of victims, targets HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protect against XSS

A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application Hardening

A

ensuring apps are safe against attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are different ways to harden an application

A

Proper authentication, encryption, validate user inputs, avoid and remediate known exploits, deploy obfuscation and camouflaged to hide source code details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ERP system

A

encryption type, user access type, types of access granted, and security of underlying infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSRF

A

Cross Site Request Forgery - Use 1 site to trick a users browser to send info from one site to another (multiple tabs communicate each other). XSRF secretly sends requests without users knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSRF

A

Variant of CSRF that is server sided - pretending to be a trusted server to manipulate server

17
Q

Directory Traversal attacks

A

manipulate file structure on a server using linux commands

18
Q

Best way to beat Directory Traversal attacks

A

Input validation, strict file access control

19
Q

Overflow Attacks

A

Target the memory set aside to store user variable content, large inputs yield unexpected behavior, getting dangerous result

20
Q

Best way to beat Overflow Attacks

A

Input validation

21
Q

Cookies and attachments

A

Track behavior across multiple websites

22
Q

Guessable Cookies

A

Using known changes in the format of the cookies - dangerous

23
Q

Cookie Guessing

A

Attempting to breach cookies by changing their value

24
Q

Session Replay Attacks -

A

possible cookie values are not encrypted in transit

Protect by making cookies secure

25
Code Execution Attacks
attack exploits vulnerabilities that allows them to run code
26
Privilege Escalation Attack
Takes a normal user account and transforms them to those with admin rights
27
What are the ways to protect against a privilege escalation attack
Input Validation, Patch OS and apps, Enforce principle of least privilege, Use DEP and ASLR Technologies
28
Driver Manipulation
Installing Malicious drivers/modifying existing drivers to access drivers that have low level access to the OS
29
Shimming
Wraps legit driver with a malicious shim, does not require access to source code
30
Code Signing
Digital sign of driver that validates functions
31
Memory Overflow
Allows arbitrary code execution
32
Resource Exhaustion
Slows down/disables system
33
Memory Leak
Fails to release memory for reuse
34
Memory Pointer
Area of memory that stores the address of another location in memory
35
Null-pointer dereferencing
Causes Application to Crash
36
DLL lnjection
Trick an application into loading malicious code i.e. library
37
Race Conditions
Proper Functions of a security controls depends upon the timing of actions i.e. accessing the same bank account
38
Best ways to protect against a Time of Use/Time of Check vulnerability
Using a lock that prevents two people from accessing the same account