1.3 Flashcards
Privilege Escalation
The process of exploiting a vulnerability in a system to gain access to higher-level privileges than those initially granted. This can allow an attacker to gain access to sensitive information or perform unauthorized actions on a system.
Cross-Site Scripting (XSS)
An attack in which an attacker injects malicious code (usually in the form of a script) into a web page viewed by other users. The script can then execute in the victim’s browser, allowing the attacker to steal sensitive data or take control of the victim’s account.
SQL Injection
An attack in which an attacker injects malicious SQL code into a database query in order to manipulate the database in unintended ways. This can allow an attacker to gain unauthorized access to data or execute arbitrary code on the system.
DLL Injection
A technique in which an attacker injects malicious code into a running process by loading a malicious dynamic-link library (DLL). This can allow an attacker to execute arbitrary code in the context of the running process.
Lightweight Directory Access Protocol (LDAP) Injection
A type of injection attack in which an attacker injects malicious input into an LDAP query in order to manipulate the results returned by the query. This can allow an attacker to gain unauthorized access to data or execute arbitrary code on the system.
XML Injection
An attack in which an attacker injects malicious XML code into an XML document in order to manipulate the way the document is processed. This can allow an attacker to gain unauthorized access to data or execute arbitrary code on the system.
Pointer/Object Dereference
A vulnerability in which a program accesses a memory location based on a pointer that has not been properly initialized, or that has been freed or deleted. This can cause the program to crash or execute arbitrary code.
Directory Traversal
An attack in which an attacker exploits a vulnerability in a web application to access files outside the web root directory. This can allow an attacker to gain unauthorized access to sensitive files on the system.
Buffer Overflow
An attack in which an attacker exploits a vulnerability in a program that allows them to overwrite the memory beyond the boundaries of a buffer. This can allow an attacker to execute arbitrary code on the system or cause it to crash.
Race Condition - Time of Check/Time of Use
A type of vulnerability that occurs when a program assumes that a particular resource will remain in a certain state between the time it is checked and the time it is used, but the resource is actually modified by another process during that time. This can allow an attacker to manipulate the resource in unintended ways or execute arbitrary code on the system.
Error Handling
The process of detecting, reporting, and resolving errors that occur during the execution of a program. Proper error handling can prevent crashes and other unexpected behavior, and can also help to prevent security vulnerabilities by catching potential issues before they can be exploited.
Improper Input Handling
A vulnerability in which a program fails to properly validate or sanitize input from external sources, such as user input. This can allow an attacker to inject malicious code or execute arbitrary commands on the system. Proper input handling can prevent these types of attacks.
Replay Attack - Session Replay
An attack in which an attacker intercepts and replays a network communication between two parties. This can allow the attacker to gain unauthorized access to data or perform actions on the system that they are not authorized to do. Proper authentication mechanisms and encryption can prevent replay attacks.
Integer Overflow
A vulnerability in which a program attempts to store a value that is too large to be represented by the data type used to store it. This can cause the program to behave in unexpected ways, potentially allowing an attacker to execute arbitrary code on the system. Proper data validation and input handling can prevent integer overflows.
Request Forgery
A type of attack in which an attacker tricks a user into unknowingly executing a malicious action on a web application, often by crafting a specially-crafted URL or form that appears to be legitimate.