1.3 Analyze potential indicators associated with application attacks Flashcards

1
Q

The ability to run any software on a target system.

A

Arbitrary code execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When a user account is able to obtain unauthorized access to higher levels of privileges.

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A form of malicious code injection attack in which an attacker is able to compromise a web server and inject their own malicious code into the content sent to other visitors.

A

Cross-site scripting (XSS or CSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Implemented by the programmer by validating input, coding defensively, escaping metacharacters, and rejection script-like input.

A

Cross-site scripting (XSS) prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Characters that have been assigned special programmatic meaning.

A

Metacharacter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of marking the metacharacter as merely a normal or common character, thus removing its special programmatic powers.

A

Escaping metacharacters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any exploitation that allows an attacker to submit code to a target system to modify its operations and/or poison and corrupt its data set.

A

Injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Focuses on executing malicious commands on a vulnerable target system.

A

Command injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adds malicious code to an existing script or application.

A

Code injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An XSS event that plants custom HTML statements.

A

HTML injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attempts to deposit a malicious file on a target system.

A

File injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Allows a malicious individual to perform SQL transactions directly against the backend database through a website front end.

A

SQL (SQLi) injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An advanced software exploitation technique that manipulates a process’s memory to trick it into loading additional code and thus performing operations the original author did not intend.

A

Dynamic link library (DLL) injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An input injection attack against a LDAP directory service.

A

Lightweight directory access protocol (LDAP) injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A variant of SQL injection, where the backend target is an XML application.

A

XML injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The programmatic activity of retrieving the value stored in a memory location by triggering the pulling of the memory based on its address or location as stored in a pointer.

A

Pointer/ Object dereferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An attack that enables an attacker to jump out of the web root directory structure and into any other part of the filesystem hosted by the web server’s host OS.

A

Directory traversal

18
Q

A memory exploitation that takes advantage of a software’s lack of input length validation. They can sometimes allow for arbitrary code execution.

A

Buffer overflow

19
Q

A memory security feature of many operating systems aimed at blocking a range of memory abuse attacks, including buffer overflows. It blocks the execution of code stored in areas of memory designated as data only areas.

A

Data execution prevention (DEP)

20
Q

A memory management mechanism that ensures that the various elements and components of the OS and other core system code are loaded into randomly assigned memory locations at each bootup.

A

Address space layout randomization (ASLR)

21
Q

Strcat(), strcpy(), sprintf(), vsprintf(), memcpy(), bcopy(), getwd(), scanf(), and gets. Usually indicate that a buffer overflow is present.

A

Unbounded C++ functions

22
Q

The manipulation of the completion order of tasks to exploit a vulnerability.

A

Race conditions

23
Q

Often called race condition attacks because the attacker is racing with the legitimate process to replace the object before it is used.

A

Time-of-check-to-time-of-use (TOCTTOU or TOC/TOU) attacks

24
Q

When a process, a procedure, or an input causes an error, the system should revert to a more secure state.

A

Error handling

25
Q

Allows for the leaking of essential information to attackers or enable attackers to force a system into an insecure state.

A

Improper error handling

26
Q

Should include the following: check for length, filter for known malware patterns, and escape metacharacters.

A

Proper input handling

27
Q

When an attacker captures network traffic and then replays (retransmits) the captured traffic in an attempt to gain unauthorized access to a system.

A

Replay attack

28
Q

May focus on initial authentication abuse. They may be used to simulate numerous new clients or cause a DoS.

A

Wireless replay attack

29
Q

The recording of a subject’s visit to a website, interacting with a mobile application, or using an PC application, which is then played back by an administrator, investigator, or programmer to understand what occurred and why based on the subject’s activities.

A

Session replay

30
Q

The state that occurs when a mathematical operation attempts to create a numeric value that is too large to be contained or represented by the allocated storage space or memory structure.

A

Integer overflow

31
Q

Exploitations that make malicious requests of a service in such a way that the request seems legitimate.

A

Request forgeries

32
Q

When a vulnerable server is coerced into functioning as a proxy.

A

Server-side request forgery (SSRF)

33
Q

Tricks the user or the user’s browser into performing actions they had not intended or would not have authorized.

A

Cross-site request forgery (XSRF or CSRF)

34
Q

Malicious usages of software through its API.

A

API attack

35
Q

Occurs when applications are allowed to operate in an unrestricted and unmonitored manner so that all available system resources are consumed in the attempt to serve the requests of valid users or in response to a DoS attack.

A

Resource exhaustion

36
Q

Occurs when a program fails to release memory or continues to consume more memory.

A

Memory leak

37
Q

An on-path attack that prevents the negotiation of strong encryption between a client and server. Early attacks blocked access to HTTPS, later versions proxied between HTTP and HTTPS, and current versions perform downgrade attacks on the cipher suits of SSL/TLS.

A

SSL stripping

38
Q

Occurs when a malicious programmer crafts a system or device driver so that it behaves differently based on certain conditions.

A

Driver manipulation

39
Q

A means of injecting alternate or compensation code into a system to alter its operations without changing the original or existing code.

A

Shimming

40
Q

A restricting or reorganizing of software code without changing its externally perceived behavior or produced results.

A

Refactoring

41
Q

An authentication attack that potentially can be used to gain access as an authorized user without actually knowing or possessing the plaintext of the victim’s credentials. This attack is mostly aimed at Windows systems.

A

Pass the hash