Chapter 3 Flashcards
(49 cards)
Acronym for API
Application Programming Interface
DLL
Dynamic Link Library
DOM
Document Object Model
LDAP
Lightweight Directory Access Protocol
RPC
Remote Procedure Call
SAM
Windows Security Account Manager
SQL
Structured Query Language
SSL
Secure Socket Layer
TLS
Transport Layer Security
TOC/TOU
Time of Check / Time of Use
XML
Extensible Markup Language
XSRF
Cross Site Request Forgery
XSS
Cross Site Scripting
Most Cyber attacks begin at a ___ level associated with an ordinary user
Ordinary User
Problem with weak validation?
1 cause behind most overflows, injection attacks and canonical structure errors
Resource Exhaustion?
A state where a system doesn’t have the resources it needs to continue to function.
Why did Microsoft reduce the number of processes and services that run in elevated mode in its operating systems?
Blocking privilege escalation is an important defensive step in a system.
What is a memory leak?
When a program doesn’t dump it’s unused memory
Another name for input validation?
Input Handling
What are stored procedures?
Functions or SQL shortcuts or macros
Three methods an attacker can use to achieve privilege escalation?
- Use existing privileges to steal a better set of credentials 2. Exploiting vulnerabilities or weaknesses in processes that are running with escalated privileges. 3.
SQL Injection attack?
Changing the where statement to ‘ or 1=1 -
Persistent XSS attack?
Where XSS script is stored on the server
Non Persistent XSS attack
Script is not stored on server but is injected and passed to the server