1.2 Application/Service attacks Flashcards
DoS(Denial of Service)
Flooding a target machine or resource with many requests to overload the system and prevent the use of its resources
DDos (distributed denial of service)
Flooding a target machine or resource with many requests to overload the system and prevent the use of its resources using multiple different sources
Man in the middle
The attacker alters the communication between two parties who believe they are directly communicating
Buffer Overflow
Program that attempts to write more data than can be held in a fixed block of memory
Injection
Occurs from processing invalid data, inserts code into the vulnerable computer program and changes the course of execution
Cross-site request forgery(XSRF)
Unauthorized commands are sent from a user that is trusted by a website. Allows the attacker to steal cookies and harvest passwords
Privilege escalation
An Attack that exploits a vulnerability that allows them to gain access to resources that they normally would be restricted from accessing
ARP poisoning
the act of falsifying the IP to MAC address resolution system employed by TCP/IP
Cross-site Scripting (XXS)
found in web applications, allows for an attacker to inject client side scripts into webpages.
Amplification
The amount of traffic sent by the atter is originally small but then is repeatedly multiplied to place a massive strain on the victim’s resources, in an attempt to cause it to fail or malfunction
DNS Poisoning
is a type of attack that exploits DNS vulnerabilities by diverting internet traffic away from a legitimate server and towards a fake one
Domain Hijacking
The act of changing the registration os a domain name without the permission of the victim
Man in the browser
A proxy trojan that infects web browsers to capture browser session data
Zero day
Exploiting flaws or vulnerabilities that are undisclosed to the world, and therefore have no defense
Replay
Network based attack where valid data transmission is rebroadcasted, repeated, or delayed.