1.3 Flashcards
Given a scenario, analyze potential indicators associated with application attacks.
Privilege Escalation
Gain higher level access to a system, exploits a vulnerability to get more capabilities. These are high-priority vulnerability patches.
Horizontal Privilege Escalation
Dose not move up into higher access, instead gets access to another user’s resources.
Mitigating Privilege Escalation
Patch quickly, antivirus and anti-malware can block known vulnerabilities. Data execution prevention only allows data in executable areas to run. Address space layout randomization prevents a buffer overrun at known memory addresses.
Cross Site Scripting
Cross Site Scripting (XSS) originally was associated with a browser vulnerability where information form one site would be shared with another. It is one of the most common web application dev errors and can take advantage of the trust a user has for a site.
Non Persistent (Reflected) XXS Attack
Websites allows scripts to be run in user inputs (search boxes). Attackers emails a link that takes advantage of this vulnerability. Script embedded in URL executes in the victim’s browser.
Persistent (stored) XXS Attack
Attacker posts a message to a social network, with no specified target as all viewers on the page are victims.
Protect against XSS
Never click untrusted links, disable JavaScript (difficult in today’s web), keep your browser up to date, and developers should validate their input data.
Code Injection
Attacker adding their code into a data stream, usually a vulnerability caused by bad programing.
SQL Injection
A code injection attack targeting SQL - the most common relational database management system.
XML Injection
Extensible Markup Language a set rules for data transfer. A code injection attack modifies the XML requests.
LDAP Injection
A code injection attack that modifies LDAP requests to manipulate application results.
DLL Injection
A code injection attack that utilizes the Dynamic-Link Library by injecting it to have an application run a program.
Buffer Overflows
Attackers take advantage of poor programing by overwriting a buffer of memory by spilling over into other memory areas. This is a difficult exploit; it takes time to make it do what you want without crashing the application.
Replay Attack
Attackers will take advantage of information transferred over network by accessing to the raw network data. (Network tap, ARP poisoning, Malware). The gathered information may be used by the attacker to replay the data across the network to appear as someone else.
Pass the Hash
A type of replay attack where the attacker gains access to the hash, and they replay the hash back to the server to pretend to be the original workstation.
You can avoid the attack by salting the hash or encrypting the information sent over the server.