1.3 Flashcards

Given a scenario, analyze potential indicators associated with application attacks.

1
Q

Privilege Escalation

A

Gain higher level access to a system, exploits a vulnerability to get more capabilities. These are high-priority vulnerability patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Horizontal Privilege Escalation

A

Dose not move up into higher access, instead gets access to another user’s resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mitigating Privilege Escalation

A

Patch quickly, antivirus and anti-malware can block known vulnerabilities. Data execution prevention only allows data in executable areas to run. Address space layout randomization prevents a buffer overrun at known memory addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cross Site Scripting

A

Cross Site Scripting (XSS) originally was associated with a browser vulnerability where information form one site would be shared with another. It is one of the most common web application dev errors and can take advantage of the trust a user has for a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non Persistent (Reflected) XXS Attack

A

Websites allows scripts to be run in user inputs (search boxes). Attackers emails a link that takes advantage of this vulnerability. Script embedded in URL executes in the victim’s browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Persistent (stored) XXS Attack

A

Attacker posts a message to a social network, with no specified target as all viewers on the page are victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protect against XSS

A

Never click untrusted links, disable JavaScript (difficult in today’s web), keep your browser up to date, and developers should validate their input data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code Injection

A

Attacker adding their code into a data stream, usually a vulnerability caused by bad programing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SQL Injection

A

A code injection attack targeting SQL - the most common relational database management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XML Injection

A

Extensible Markup Language a set rules for data transfer. A code injection attack modifies the XML requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP Injection

A

A code injection attack that modifies LDAP requests to manipulate application results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DLL Injection

A

A code injection attack that utilizes the Dynamic-Link Library by injecting it to have an application run a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Buffer Overflows

A

Attackers take advantage of poor programing by overwriting a buffer of memory by spilling over into other memory areas. This is a difficult exploit; it takes time to make it do what you want without crashing the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Replay Attack

A

Attackers will take advantage of information transferred over network by accessing to the raw network data. (Network tap, ARP poisoning, Malware). The gathered information may be used by the attacker to replay the data across the network to appear as someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pass the Hash

A

A type of replay attack where the attacker gains access to the hash, and they replay the hash back to the server to pretend to be the original workstation.

You can avoid the attack by salting the hash or encrypting the information sent over the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Browser Cookies

A

Cookies can store information that could be used for replay attacks - personalization, session management.

Session IDs are often stored in the cookies, and attackers can use that to pose as someone else without needing a username or password.

17
Q

Prevent Session Highjacking

A

Encrypting end-to-end communication, use protocols like HTTPS over HTTP.

Encrypting end-to-somewhere with options like a personal VPN, while being in the clear for part of the journey, it will have some encryption

18
Q

Cross-site Requests

A

Cross site requests are common and legitimate, one web page may gather information for several other websites. Most of these are unauthenticated requests.

19
Q

Cross-Site request forgery

A

One-click attack or sessions riding (XSRF, CSRF), it will take advantage of the trust a web app has for the user. Significant web application development oversights will allow for these, to prevent a cryptographic token can be used.

20
Q

Server-side Request Forgery (SSRF)

A

Attacker finds a vulnerable web application, they send a request to the web server, and the server performs the request on behalf of the attacker. This attack occurs because of bad programming, the server should always validate the input and output from the user. These are rare but critical vulnerability.

21
Q

Zero Day Attack

A

A unknown vulnerability that can be exploited.

22
Q

Shimming

A

Windows Includes its own shim that allows backwards compatibility with previous Windows version. Malware authors write their own shims to get around security.

23
Q

Refactoring

A

Attackers can refactor (or change the appearance of the code) to make the malware look different and let it go undetected by anti-malware software.

24
Q

SSL Stripping/HTTP Downgrade

A

Combines an on-path attack with a downgrade attack, they will sit in the middle of the conversation to strip away the security measures on the conversation. Victim does not see any significant problem except for the browser page which isn’t encrypted. This is a client/server problem, everything needs to be up to date.

25
Q

SSL & TLS

A
  • SSL 2.0 - ended 2011
  • SSL 3.0 - ended 2015
  • TLS 1.0 - upgraded SSL, can be downgraded to SSL 3.0 (less secure)
  • TLS 1.1 - ended 2020
  • TLS 1.2 & TLS 1.3 - Latest TLS standards
26
Q

Race Condition

A

A programing issue that occurs when multiple things are running at the same time, can be vulnerable if the programmer didn’t plan for it.

27
Q

TOCTOU

A

Time of check to time of use attack - an attack that takes advantage of a race condition.

28
Q

Memory Vulnerabilities

A

Memory leak, unused memory is not properly released, and it begins to grow in size. Eventually it will use all memory and the system will crash.

29
Q

Null Pointer Dereference

A

Programming techinique that refrences a portion of memory, attackers will have the refrence point to nothing

30
Q

Integer Overflow

A

Large number into a smaller sized space, you shouldn’t be able to manipulate memory this way. Programming oversite

31
Q

Directory Transversal

A

Read files from a web server that are outside of the website’s file directory.

32
Q

Improper Error Handling

A

Errors should show just enough information and avoid any sensitive data.

33
Q

Improper Input Handling

A

Many applications accept user input, and all input should be considered malicious. Always check and validate the user input.

34
Q

API Attack

A

Attackers look for vulnerabilities in the application programming interface.