middy1 Flashcards
Passwords Vulnerabilities Execution Control flow hijack Control flow defense ROP CFI Heap attacks Attack surface (54 cards)
What is authentification?
Proving who you are
What are the 4 means of authenticating a user?
Something the user:
1. knows
2. possesses
3. is
4. does
Regarding authentication, what is an example of something the user knows?
car model, password, PIN
Regarding authentication, what is an example of something the user possesses?
smartphone, physical key, tokens
Regarding authentication, what is an example of something the user is?
face, fingerprint, iris
Regarding authentication, what is an example of something the user does?
Typing rhythm, voice pattern
What is the safe way to store passwords?
By hashing passwords with a salt and storing them in a file only the root user can access.
What is a vulnerability?
a flaw that is accessible to an adversary who can exploit that flaw.
What is a flaw?
a functionality that violates security and reachable.
What is an exploit?
provides input to cause security violation and the adversary can produce an attack payload.
What defines how flaws are reachable?
threat models
What are the 3 security requirements?
confidentiality, integrity, availability
Regarding security, what is confidentiality?
secrecy, sensitive data should be safe from adversary.
Regarding security, what is integrity?
when sensitive data is safe from unauthorized modification and is accurate.
Regarding security, what is availability?
when the services are available for users.
For the line below, what code form is it in? Explain it:
int t = x + y;
( C code )
two integers are being added and the result is stored in t.
For the line below, what code form is it in? Explain it:
addl 8(%ebp), %eax
( Assembly code )
adding two 4-byte integers
For the line below, what code form is it in?
0x80483ca: 03 45 08
Object code
This 3-byte instruction is being stored at address 0x80483ca.
what is eip?
Extended instruction pointer, this register holds the address of the next instruction.
what is EFLAGS?
the condition codes.
What can modify the eip?
CALL, RET, JMP, and cond. JMP
How can we reference memory?
loading a value from memory (mov)
or
loading an address (lea)
Is this a direct or indirect jump?
jmp 0x45
direct
Is this a direct or indirect jump?
jmp *eax
indirect