1.3 Application Attacks Flashcards

1
Q

Priviledge Escalation

A

attacks seek to increase the level of access that an attacker has to a target system. They exploit vulnerabilities that allow the transformation of a normal user account into a more privileged account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cross-site scripting

A

These occur when web applications allow an attacker to perform HTML injection, inserting their own html code into a webpage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Injections

A

This is an attack that attackers use in order to break through a web application and gain access to the systems supporting that aplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQL injection

A

An attacker is able to provide input to the web application and then monitor the output of that application to see the result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic link library

A

Malware triesd to inject code into the memory process space using a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lightweight directory access protocol

A

Users input is not properly filtered and the return can be executed commands etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Markup Language (XML)

A

This is where attackers embed code in extensible markup language documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pointer/object dereference

A

These are simply an area of memory that stores an address of another location in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Directory traversal

A

This is when a web server suffer from a security misconfiguration that allows users to navigate the directory structure and access files that should remain secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer overflows

A

These occur when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Time of check/time of use

A

This is a race condition that occurs when a program checks access permissions too far in advance of a resource request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Error handling

A

This is when developers of code step in and handle security risks before an attacker can do their attacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Improper input handling

A

These can expose applications to injection attacks, XSS and other exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Replay attack

A

an attempt to reuse authentication requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Integer overflow

A

This is where the result of an arithmetic operation attempts to store an integer that is too large to fit into the specified buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Request forgeries

A

These exploit trust relationships and attempt to have users unwittingly execute commands against a remote server.

17
Q

server-side

A

These attacks trick a server into visiting a URL based on user-supplied input.

18
Q

cross-site

A
19
Q

Application programming interface (API) attacks

A

These allow anyone with knowledge of the API URL’s to modify a service. Make sure there is end to end encryption with API’s: HTTPS

20
Q

Resource exhaustion

A

Systems may consume all of the memory, storage, processing time, or other resources available to them, rendering the system disabled or crippled from other uses.

21
Q

Memory leak

A

This is when an application fails to return some memory that it no longer needs, perhaps by losing track of an object that it has written to a reserved area of memory.

22
Q

Secure Sockets Layer (SSL ) stripping

A
23
Q

Driver manipulation

A

When an attacker convinces a user to install a malicious driver on their computer, and then the attacker can gain complete control of the system

24
Q

Shimming

A

This takes a legit driver and wraps a malicious driver around the outside of it

25
Q

Refactoring

A

If an attacker has access to the driver’s source code, they can modify it to also include malware elements.

26
Q

Island hopping attack

A

Compromising vulnerable vendors in the supply chain and then attempt to attack the target organization.