SECOPS 6: Common Attack Vectors Flashcards

1
Q

Goal of Obfuscating javascript code

A

Protect IP of developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

eval()

A

Sign of JavaScript obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DOM

A

HTML Model for accessing web-based documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

jsunpack or jsdetox

A

Model to decode obfuscated javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

JavaScript key variable

A

Always the first part of a string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

‘+”"”)())();’

A

JavaScript string always ends with this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DEP

A

Prevents the use of stack memory space for execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DEP circumvented by…

A

heap memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ASLR bypassed by…

A

egg hunting (executing code stub that ID’s memory location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shellcode stage payload

A

Buffer overflow to acquire memory space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unstaged payload

A

No space limitations. Payload resides with a single memory space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Way to detect shellcode on the network

A

Detect a sequence of NOP instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NOP Sled

A

Sequence of NOP instructions that precedes shellcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NOP instructions do what?

A

Nothing, then move to the next instruction until they find the shellcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Snort and Bro use generic signatures to detect…

A

Shellcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metasploit singles

A

Self contained payloads that function on their own

17
Q

Metasploit stagers

A

Sets up network connection between attacker and victim.

18
Q

Stages

A

Actual malicious payload. Execution and exploitation.

Self contained.

19
Q

Meterpreter

A

Executed only in memory.

20
Q

Metasploiit NoNX

A

Circumvents DEP

21
Q

DLL Injection

A

Stage payload is injected into compromised host process running in memory. Never written to disk.

22
Q

.,\

A

Used for directory traversal. Up a level.

23
Q

SQL Injection Consequences

A

Auth bypass
Information disclosure
Compromised CIA
Remote Code Execution

24
Q

uricontent:”.pl”

A

URI’s that end in .pl (Perl)

25
Pcre:”/(%27)…: (regex)
Perl Compatible Regular Expression
26
SID (in IPS signature)
Snort Identifier
27
Stored XSS
Malicious code stored on the web server. Done by submitting it to forms (comment boxes)
28
Reflected (nonpersistent) XSS
HTML code in a URL. User needs to click the link.
29
Punycode
Converts Unicode characters to ASCII format.
30
Punycode format
xn---. fàcebook.com in Punycode becomes xn--fcebook-lta.com
31
xn--
Symbolizes beginning of converted punycode URL
32
DNS tunneling
Using alternative malicious external DNS server