1.2 Application/Service attacks Flashcards
DoS(Denial of Service)
Flooding a target machine or resource with many requests to overload the system and prevent the use of its resources
DDos (distributed denial of service)
Flooding a target machine or resource with many requests to overload the system and prevent the use of its resources using multiple different sources
Man in the middle
The attacker alters the communication between two parties who believe they are directly communicating
Buffer Overflow
Program that attempts to write more data than can be held in a fixed block of memory
Injection
Occurs from processing invalid data, inserts code into the vulnerable computer program and changes the course of execution
Cross-site request forgery(XSRF)
Unauthorized commands are sent from a user that is trusted by a website. Allows the attacker to steal cookies and harvest passwords
Privilege escalation
An Attack that exploits a vulnerability that allows them to gain access to resources that they normally would be restricted from accessing
ARP poisoning
the act of falsifying the IP to MAC address resolution system employed by TCP/IP
Cross-site Scripting (XXS)
found in web applications, allows for an attacker to inject client side scripts into webpages.
Amplification
The amount of traffic sent by the atter is originally small but then is repeatedly multiplied to place a massive strain on the victim’s resources, in an attempt to cause it to fail or malfunction
DNS Poisoning
is a type of attack that exploits DNS vulnerabilities by diverting internet traffic away from a legitimate server and towards a fake one
Domain Hijacking
The act of changing the registration os a domain name without the permission of the victim
Man in the browser
A proxy trojan that infects web browsers to capture browser session data
Zero day
Exploiting flaws or vulnerabilities that are undisclosed to the world, and therefore have no defense
Replay
Network based attack where valid data transmission is rebroadcasted, repeated, or delayed.
Press the Hash
an authentication attack the captures the hash of a password, the attacker then attempts to log on as the user with the stolen hash. commonly associated with Microsoft NTLM (New Technology LAN Manager) Protocol
Hijacking and related attacks
I. Clickjacking- overlay of malicious link over what appears to be a legitimate website
II. Session hijacking- an attack in which an attacker attempts to impersonate the user by using their legitimate session token
III. URL hijacking- Redirects the user to a false website based on misspelling the URL(AKA Typosquatting
Driver Manipulation
I. Shimmering- the process of injecting alternate or compensation code into a system in order to alter its operations without changing the original or existing code
II. Refactoring- Rewrites the internal processing of code without changing its behavior