1.3 Flashcards
Given a scenario, analyze potential indicators associated with application attacks.
A cyberattack is a multistep process. Most attacks begin at a privilege level associated with an ordinary user. From this level, the attacker exploits vulnerabilities that enable them to achieve admin level access. This step in the attack chain is called _______________ and is essential for many attack efforts.
Privilege escalation
Is a type of security vulnerability commonly found in web applications. The cause of the vulnerability is weak user input validation. If input is not validated properly, an attacker can include a script in their input and have it rendered as part of the web process.
Cross-site scripting (XSS)
A type of attack that takes advantage of the absence of or flaws in the user input validation. Results in an opportunity for an attacker to craft input to create specific events that occur when the input is parsed and used by the application
Injection Attacks
Is a form of code injection aimed at any SQL-based database, regardless of vendor.
Structured query language (SQL) injections
A type of injection that involves injecting or loading a dynamic-link library (DLL) into the address space of a running process. DLLs are files that contain code and data that multiple programs can use simultaneously. Allows a program to run code in the context of another process by loading a DLL into that process’s memory space.
Dynamic-link library (DLL) injections
In this type of injection, an attacker exploits vulnerabilities in the way user inputs are handled in LDAP queries. This can lead to unauthorized access to sensitive information or the execution of unintended LDAP commands.
Lightweight Directory Access Protocol (LDAP) injections
In this type of injection, the attacker exploits vulnerabilities in the way an application parses, processes, or validates XML input. The goal is to manipulate the XML data in a way that the application misinterprets or executes unintended actions.
Extensible Markup Language (XML) injections
Is a concept that involves accessing or manipulating the value stored at a memory location pointed to by a pointer or an object reference. This operation is fundamental in programming but can become a security concern if not handled carefully, leading to vulnerabilities. Improper handling of pointer or object dereference can lead to various security vulnerabilities such as undefined behavior or crashes.
Pointer/object dereference
Is when an attacker uses special inputs to circumvent the directory tree structure of a filesystem.
Directory traversal
Is a type of security vulnerability that occurs when a program writes more data to a block of memory, or buffer, than it was allocated to hold. This excess data can overflow into adjacent memory, corrupting or overwriting critical information. Can lead to unpredictable behavior, crashes, or even the execution of arbitrary code by attackers, making them a significant security concern.
Buffer overflows
Is an error condition that occurs when the output of a function is dependent on the sequence or timing of the inputs. It becomes a bug when the inputs do not happen in the order the programmer intended.
Race conditions
Is a type of attack that takes advantage of a separation between the time a program checks a value and when it uses the value, allowing an unauthorized manipulation that can affect the outcome of a process.
Time of check/time of use (TOC/TOU) Attack
_____________ can lead to a wide range of disclosures. For example, error messages can disclose data structures, memory dump, stack traces, data dumps, etc.
Improper Error handling
____________ is the root cause behind most overflows, injection attacks, and canonical structure errors. Users have the ability to manipulate input, so it is up to the developer to handle the input appropriately to prevent malicious entries from having an effect.
Improper input handling
Is a type of cyber attack in which an attacker intercepts and maliciously retransmits data that was previously captured during a legitimate communication session. The goal of this type of attack is to deceive a system by reusing valid data, such as authentication credentials, session tokens, or encrypted messages, to gain unauthorized access or perform malicious actions.
Replay attack