1.3 Application attacks Flashcards
What is privilege escalation?
gain higher level access (eg root) to a system by exploiting a vulnerability or bug
How to mitigate privilege escalation?
- patch quickly
- update antivirus/antimalware
- ensure only data in executable area can run
- prevent a buffer overrun at known adress memory
What is XXS (cross site scripting)?
attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user
What is Non-persistent XSS?
website allows script to run in user input field (eg search field)
What is a Persistent XXS attack ?
attacker posts a message to a social media that include a malicious payload
How ro protect against XXS?
- never click on untrusted links
- keep the browser update
- consider disabling javascript (difficult to do)
- don’t allow users to add their own scripts to an input field
What is an Injection attack?
- adding your own code (sql, htmpl, xml) into a data stream
- enable because of bad programming
What is SQLi?
most famous type of injection attack that allows the hacker to modify SQL requests
What is XML injection?
It is a category of vulnerabilities where an application doesn’t correctly validate/sanitize user input before using it in an XML document or query. XML, which stands for extensible markup language, is a language format that’s commonly used for structuring storing data.
What is LDAP injection?
- Lightweight directory access protocol (LDAP) is a protocol that helps users find data about organizations, persons, and more. LDAP has two main goals: to store data in the LDAP directory and authenticate users to access the directory.
- LDAP injection is query to gain unauthorized access to information that could result in information disclosure, data manipulation, or theft.
What is DLL injection?
DLL hijacking is a method of injecting malicious code into an application by exploiting the way some Windows applications search and load Dynamic Link Libraries (DLL). Only Microsoft operating systems are susceptible to DLL hijacks.
What is a buffer overflow?
A buffer overflow, or buffer overrun, occurs when more data is put into a fixed-length buffer than the buffer can handle. The extra information, which has to go somewhere, can overflow into adjacent memory space, corrupting or overwriting the data held in that space.
What is a replay attack?
attack that involves the capture of transmitted authentication or access control information and its subsequent retransmission with the intent of producing an unauthorized effect or gaining unauthorized access
What is the difference between man-in-the-middle and replay attacks?
Replay and Man-in-the-middle attacks -In general a replay attack refers to capturing legitimate traffic and reusing it at a later time without modification. On the other hand, a man-in-the-middle attack involves manipulating existing network packets or forging new ones.
what is pass the hash attack ?
technique where an attacker captures a password hash (as opposed to the password characters) and then passes it through for authentication and lateral access to other networked systems. With this technique, the threat actor doesn’t need to decrypt the hash to obtain a plain text password. PtH attacks exploit the authentication protocol.