1.3 Given a scenario, analyze potential indicators associated with application attacks Flashcards
Privilege escalation
occurs when a user is able to obtain unauthorized access to higher level of privileges
Cross-site scripting attack
a form of malicious script-injection attack in which an attacker is able to compromise a web server and inject their own malicious code into the content sent to other visitors.
Arbitrary Code Execution
The ability to run any software on a target system
Cross-site scripting prevention
The most effective ways to prevent XSS on a resource host are implemented by the programmer by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.
Metacharacters
characters that have been assigned special programmatic meaning.
Injection attacks
any exploitation that allows an attacker to submit code to a target system to modify its operations and/or poison and corrupt its data set.
Command Injection
focuses on executing malicious commands on a vulnerable target system
Code Injection
adds malicious code to an existing script or application
HTML injection
effectively an XSS event, but instead of using JavaScript or other code, it plants custom HTML statements.
File Injection
Attempts to deposit a file on a target system
SQL Injection
allow a malicious individual to perform SQL transactions directly against the backend database through a website front end
Dynamic Link Library (DLL) Injection
advanced software exploitation technique that manipulates a process’s memory to trick into loading additional code and thus performing operations the original author did not intend.
Lightweight Directory Access Protocol (LDAP) Injection
input injection attack against a LDAP directory service
XML Injection
Another variant of SQL injection, where the backend target is an XML application
pointer dereference
programmatic activity of retrieving the value stored in a memory location by triggering the pulling of the memory based on its address or location as stored in a pointer.