Broken access Control Flashcards

(20 cards)

1
Q

Name two organizations that publish common vulnerabilities

A

OWASP and CWE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does OWASP stands for?

A

Open Worldwide Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does CWE stands for?

A

The Common Weakness Enumeration is a community developed list of software and hardware weaknesses that helps in identifying vulnerabilities in software security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Unit / Integration testing?

A

Testing methodology that exposes defects in the individual units of source code/ interfaces and in the interactions between integrated components or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is:
Static Application Security Testing (SAST)?

A

Is a testing methodology that analyzes source code to find security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Software Composition Analysis (SCA)?

A

Is a methodology that analyzes applications for third parties and open source software to detect illegal, dangerous, or outdated code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Dynamic Application Security Testing (DAST) ?

A

Is a black/grey box testing methodology that examines an application as it’s running to find vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Pentest?

A

Is a manual practice of testing a computer system, network or web application to find security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the goal of software security?

A

To maintain the confidentiality, integrity, and availability of information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the mentality of an attacker?

A

Any action not specifically denied, is allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What principle should follow application access?

A

Least privilege: only be granted for specific capabilities, roles or users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When is access control effective?

A

Access control is only effective if enforced in trusted server side code or severless APIs, where the attacker cannot modify the access control checks or metadata.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If restrictions on what users can do are not properly enforced, attackers could:

A

View sensitive files
Access other users accounts
Modify other users data
Change access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Force browsing is a technique where attackers:

A

Attempt to access restricted pages by guessing their URL address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DAST and SAST tools can be used to confirm the presence of properly implemented and functional access control.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential stuffing can be largely prevented by:

A

Rate limiting login attempts

17
Q

Application access should follow the principle of:

A

Least privilege

18
Q

Applications can be vulnerable to Access Control flaws if:

A

Checks can be circumvented by modifying a URL
Metadata can be manipulated
Users can act outside of their intended permissions

19
Q

Access controls should be configured for “deny by default” on all resources

20
Q

To detect potential credential stuffing you should

A

Log access control failures
Alert administrators to repeated login failures
Re use access control mechanisms throughout the application