Recognizing Application Attacks Flashcards
Dump the SAM
Privilege Escalation attack that gets the Security Accounts Manager on Windows
Retrieve /etc/password file
Privilege Escalation attack on a Linux machine
Look for insecure file shares
Privilege Escalation attack
DLL preloading
Privilege Escalation attack that replaces good dll’s with hacked versions.
Insecure or weak security processes
Privilege Escalation attack
Non-persistant XSS
Crafted URL for email blog posts
DOM based XSS
Used to hijack sessions
Persistant XSS
Server based that can execute on users PC by visiting infected site.
SQL Injection Attack
Modifying the query to get additional information not allowed.
DLL Injection
Inserting code into a running process and attach memory and then run.
LDAP Injection
Modified query to get LDAP to bring back different information than intended.
LDAP
Lightweight Directory Access Protocol that checks for user and group permissions in AD.
XML Injection
Manipulates XML file to perform different logic.
Pointer Dereference
Cause an application to throw an error an crash. (DOS attack or Remote Code execution.)
Directory Traversal/Command Injection
Manipulates user input to gain access to files not intended to be visible.
Buffer Overflow
Enough data to overflow memory allowing an attacker to input their code and elevate their privileges.
Race Conditions
Being able to manipulate the order that actions are to be performed allowing them to get access or modify or disclose data.
Time of Check
Part of race condition, where an attacker is able to gain access before the authentication check.
TOCTTOU
Time of Check to Time of Use
Replay Attack
Captures packets and puts them back on the wire. Can be stopped with digital timestamps aka sequencing.
Integar Overflow
When the equation results in a higher than allowed amount and the integar starts to wrap around cause it can’t fit. Reverse money sent to money received etc.
Cross Site Request Forgery (XSRF See-Surf)
Stealing a users active cookie.
API
Application Programming Interface (API could be the gas petal that runs the car so you don’t need to know how the engine works but you just need to know the gas petal)
XSS vs XSRF
XSS: Browser runs code because it came from a site it trusted.
XSRF: Server performs an action cause it was sent from a client it trusted.