1.3 Application attacks Flashcards
privilege escelation
vulnerability or some type of design flaw is allowing a normal user to suddenly gain extended capabilities on that system
horizontal privilege escalation
where one user is able to gain access to resources that would normally only be available to another user of the same level. It doesn’t have to be an administrator account or a root account. Simply user A is gaining access to files and resources for user B
data execution prevention
a way to only allow applications to run in certain areas of memory where that particular function is allowed.
safeguards in place to prevent someone from taking advantage of a privileged escalation
many operating systems will randomize where information is stored in memory so that if attacker finds a way to take advantage of a memory address on one system, they would not be able to duplicate that on another operating system
CBE 2020-1530
Windows Remote Access Elevation of Privileged Vulnerability. It was released on August of 2020
attacker would only need to run a single program and they would have elevated access on that system.
cross-site scripting
web applications that allows attackers to inject malicious scripts or code into web pages viewed by other users.
stored XSS (persistant)
the malicious script or code is permanently stored on the target web server, often on websites that have messages, or forum posts. When a user visits a post where the injected script is displayed, the browser executes it.
Reflected XSS
malicious script is embedded in a URL or in data sent to a web server as part of an HTTP request (e.g., through a query parameter). The server reflects this input back to the user’s browser without proper validation, and the script is executed when the user visits the malicious link. Reflected XSS attacks are often used in phishing campaigns
DOM-Based XSS
DOM (Document Object Model)-based XSS attacks occur when the client-side code of a web application modifies the DOM without proper validation. The attacker manipulates the client-side code to execute malicious scripts in the user’s browser. This type of XSS is often more challenging to detect and mitigate
DOM
Document Object Medel
CSP
Content Security Policy
Input Validation
Ensure that all input from users is properly validated and sanitized before being displayed on a web page.
Output Encoding
Implement a CSP to restrict the sources from which content can be loaded, reducing the risk of malicious script execution.
Code injection Attack
when the attacker puts their own code into an existing data stream
SQL
Structured Query Language
SQL Injection
when an attacker is able to manipulate or inject malicious SQL (Structured Query Language) code into a web application’s input fields or other user data entry points.