1.3 Given a scenario, analyze potential indicators associated with application attacks Flashcards

1
Q

Privilege escalation

A

occurs when a user is able to obtain unauthorized access to higher level of privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cross-site scripting attack

A

a form of malicious script-injection attack in which an attacker is able to compromise a web server and inject their own malicious code into the content sent to other visitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Arbitrary Code Execution

A

The ability to run any software on a target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cross-site scripting prevention

A

The most effective ways to prevent XSS on a resource host are implemented by the programmer by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Metacharacters

A

characters that have been assigned special programmatic meaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Injection attacks

A

any exploitation that allows an attacker to submit code to a target system to modify its operations and/or poison and corrupt its data set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command Injection

A

focuses on executing malicious commands on a vulnerable target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code Injection

A

adds malicious code to an existing script or application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTML injection

A

effectively an XSS event, but instead of using JavaScript or other code, it plants custom HTML statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File Injection

A

Attempts to deposit a file on a target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SQL Injection

A

allow a malicious individual to perform SQL transactions directly against the backend database through a website front end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dynamic Link Library (DLL) Injection

A

advanced software exploitation technique that manipulates a process’s memory to trick into loading additional code and thus performing operations the original author did not intend.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lightweight Directory Access Protocol (LDAP) Injection

A

input injection attack against a LDAP directory service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

XML Injection

A

Another variant of SQL injection, where the backend target is an XML application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

pointer dereference

A

programmatic activity of retrieving the value stored in a memory location by triggering the pulling of the memory based on its address or location as stored in a pointer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly