ch7 Flashcards
(9 cards)
Type of application vulnerability, taht sees a secret inseration of malicious code ino a program memory space allowing attackers to exploit vulnerability
Memory Inkection
Type of application attack which happnes when excessive data overflows a programs buffers, causing choas
Buffer Overflow
This type of vulnerabilitiy is when two memroy threads attempt to access the same information at the same time.
Race Condition or TOC/TOU
Vulnerability where updates can delivery malicious code to a program
Malicious update
Web based vulnerability when at attacker exploits vulnerability in a website or an applications input field to manipulate SQL queries
SQLI
SQLI steps
User Input fields, malicous input, query manipulation, data expouser
Two ways to mitigate a SQLI vulnerabilty
Stored procedure and input validation
Types of hardware vulnerabilities
Vulnerability in firmware, End of LIfe Systems, Legacysystems vulnerability