1.3 Analyze potential indicators associated with application attacks Flashcards
The ability to run any software on a target system.
Arbitrary code execution
When a user account is able to obtain unauthorized access to higher levels of privileges.
Privilege escalation
A form of malicious code injection attack in which an attacker is able to compromise a web server and inject their own malicious code into the content sent to other visitors.
Cross-site scripting (XSS or CSS)
Implemented by the programmer by validating input, coding defensively, escaping metacharacters, and rejection script-like input.
Cross-site scripting (XSS) prevention
Characters that have been assigned special programmatic meaning.
Metacharacter
The process of marking the metacharacter as merely a normal or common character, thus removing its special programmatic powers.
Escaping metacharacters
Any exploitation that allows an attacker to submit code to a target system to modify its operations and/or poison and corrupt its data set.
Injection attack
Focuses on executing malicious commands on a vulnerable target system.
Command injection attack
Adds malicious code to an existing script or application.
Code injection attack
An XSS event that plants custom HTML statements.
HTML injection attack
Attempts to deposit a malicious file on a target system.
File injection attack
Allows a malicious individual to perform SQL transactions directly against the backend database through a website front end.
SQL (SQLi) injection attack
An advanced software exploitation technique that manipulates a process’s memory to trick it into loading additional code and thus performing operations the original author did not intend.
Dynamic link library (DLL) injection attack
An input injection attack against a LDAP directory service.
Lightweight directory access protocol (LDAP) injection attack
A variant of SQL injection, where the backend target is an XML application.
XML injection attack
The programmatic activity of retrieving the value stored in a memory location by triggering the pulling of the memory based on its address or location as stored in a pointer.
Pointer/ Object dereferencing