Attacks, Threats, and Vulnerabilities Flashcards
(113 cards)
Cross-site Request Forgery (XSRF)
is a malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.
Cross-site scripting (XSS)
is a malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site.
Exploits the fact that the browser is likely to trust scripts that appear to come from a site the user has chosen to visit
Shimming
is the process of developing and implementing additional code between an application and the operating system to enable functionality that would otherwise be unavailable.
How serious are Memory leaks in the OS kernel? What could it mean?
are extremely serious. A memory leak may itself be a sign of a malicious or corrupted process.
If the pointer that references an object at a memory location was set to a null value by a malicious process,
then this can create a null pointer exception, causing instability and crashes.
When does a memory leak vulnerability occur?
What does it lead to?
A memory leak vulnerability occurs when software does not release allocated memory when it has finished using it, potentially leading to system instability.
If the pointer is set to a null value by a malicious process
this creates a null pointer exception, and the process will crash. Programmers can use logic statements to test that a pointer is not null before trying to use it.
Document Object Model (DOM) Cross-Site Scripting (XSS) exploits vulnerabilities in …
client-side scripts to modify the content and layout of a web page.
What is a Stored (or persistent) Cross-Site Scripting (XSS)
is a server-side script attack that inserts code into a back-end database used by the trusted site.
Reflected Cross-Site Scripting (XSS)
is a server-side input validation exploit that injects a script into a website. Once the victim visits the infected website, the malicious code executes in the user’s browser.
Clickjacking
occurs when the attacker inserts an invisible layer into a trusted web page that can intercept or redirect input without the user realizing it.
What Error or exception handling?
is the process of responding to the occurrence of an error in the form of an outputted message. This can provide insight to issues in the code which are not necessarily related to security.
What is a client-side (or cross-site) request forgery?
is an attack that forces a user to execute unwanted actions to a web server that the user is currently authenticated to.
What does a “server-side request forgery” do?
abuses the functionality and services of backend servers to read and update internal resources. This can expose, for example, database information, even without an authenticated session
What does a command injection attack do?
What does it allow?
runs OS shell commands from the browser, and allows commands to operate outside of the server’s directory root, allowing commands to run as the web “guest” user.
describe a DLL injection
is not a vulnerability of an application, but of the way the operating system allows one process to attach to another, and then forces it to load a malicious link library.
Improper input handling exposes …
software to input validation attacks. When an attacker exploits improper input handling, it crashes the process hosting the code, performs
What is “Refactoring” (coding, programing)
means the code performs the same function by using different methods. Refactoring means that the antivirus software may no longer identify the malware by its signature.
Pointer dereference, what is it and what would it do?
is a software vulnerability that can occur when the code attempts to remove the relationship between a pointer and the thing it points to (pointee). Dereferencing may crash the application and corrupt memory.
An integer overflow attack
causes the target software to calculate a value that exceeds the upper and lower bounds.
How To exploit a buffer overflow vulnerability,
the attacker passes data that deliberately overfills the buffer (an area of memory) that the application reserves to store the expected data.
Default application settings may expose more information than necessary when errors occur.
Exposing such information over an HTTP connection may provide insight of the environment to the attacker.
An application programming interface (API) intrusion occurs when
an attacker takes advantage of unsecure communication with application services to perform denial of service attacks using multiple API calls, for example.
An application programming interface (API) intrusion occurs when …
an attacker takes advantage of unsecure communication with application services to perform denial of service attacks using multiple API calls, for example.