1.3 Given a scenario, analyze potential indicators assoicated with application attacks Flashcards

1
Q

Privilege escalation

A

An attacker exploits a bug within an application to bypass the application and gain elevated privileges that enable the attacker to execute system commands.

Protection against privilege escalation requires that programmers use input validation and test their code for bugs and exploits before releasing the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cross-site scripting (XSS)

A

Cross-site scripting (XSS) is a type of website application vulnerability that allows malicious users to inject malicious code into dynamic websites that rely on user input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Injections

A

Injections insert code into a running process, forcing a program to behave in a manner that it was not intended to do.

  1. Structured query language (SQL)
  2. Dynamic Link Library
  3. Lightweight Directory Access Protocol
  4. XML injections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Structured query language (SQL) Injection

A

The attacker sends SQL input to the database via an input form. The results returned to the attacker are responses to those commands, giving the attacker access to information stored within the database that shouldn’t be available to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic Link Library (DLL) injection

A

DLL injections exploit DLLs by inserting code into a DLL and then having the original process load and execute the code within the DLL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lightweight Directory Access Protocol (LDAP) injection

A

Which is like a SQL injection attack, inserts code into user-based input that is utilized in a query to an LDAP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Markup Language (XML) injections

A

Can modify how an XML application processes data. By injections into the XML application, the attacker causes the application to process data according to the malicious injected XML code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pointer/object dereference

A

An attack that consists of finding null references in a target program and dereferencing them, causing an exception to be generated.

Dereferencing means taking away the reference and giving you what it was actually referring to.

The vulnerability in memory that usually causes the applications to crash or a denial of service is a Null Pointer dereference.

In this case, there is nothing at that memory address to dereference and the application crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Directory Traversal

A

A type of access vulnerability that enables a hacker to get unauthorized access to files on a web server other than the public files that are served on the website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer overflow

A

Buffer overflow is a programming term used to describe when input data exceeds the limits recognized by a program.

In a buffer overflow attack, the extra characters are malicious code that causes the program or even the entire system to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Race conditions
—Time of check/time of use

A

Race condition happens when an application is dependent on the steps to be performed in an appropriate order, and the steps are subsequently then executed out of order, creating a crash or other negative situation that can be exploited by an attacker.

Time of check/time of use, this condition occurs when Step A occurs and then the state changes before the use of that authentication occurs.

Time of check/time of use (TOC/TOU) issue is a race condition that occurs when a program checks access permissions too far in advance of a resource request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Error handling

A

Error handling could ensure that out-of-range numerical values are handled in safer ways, such as by converting the value to text, truncating or converting it, or ignoring unexpected values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Improper input handling

A

Improper input handling that allows so much data to be entered into the application that the processing limits are exceeding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Replay attacks

A

An attempt to reuse authentication requests.

Occurs when an unauthorized user captures network traffic and then sends the communication to its original destination, acting as the original sender.

To prevent replay attacks, you can implement time stamps, sequence numbers, or randomized session IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Replay attacks
— Session replays

A

Session replay, an attacker steals a valid session ID of a user and reuses it to impersonate an authorized user and perform fraudulent transactions or activities.

Preventing session replay, disallow session ID use in web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integer overflow

A

Putting too much information into too small of space that has been set aside for numbers.

The outcome of a successful integer overflow attack is like that of a buffer overflow attack.

This attack can be prevented through input validation and also error handling condition in the web app programming that deal with such overflow conditions.

17
Q

Request forgeries

A

Request forgeries attacks exploit trust relationships and attempt to have users unwittingly execute commands against a remote server.

They come in two forms: cross-site request forgery and server-side request forgery.

18
Q

Cross-site request forgery (XSRF)

A

XSRF attacks exploit the trust that remote sites have in a user’s system to execute commands on the user’s behalf.

XSRF attacks work by making the reasonable assumption that users are often logged into many different websites at the same time. Attackers then embed code in one website that sends a command to a second website. When the user clicks the link on the first site, they are unknowingly sending a command to the second site. If the user happens to be logged into that second site, the command may succeed.

19
Q

Server-side request forgery (SSRF)

A

Server-side request forgery attacks exploit a similar vulnerability but instead of tricking a user’s browser into visiting a URL, they trick a server into visiting a URL based on user-supplied input

20
Q

Application programming interface (API) attacks

A

API serves as a translator between systems and software, defining what and how elements can be called.

API attacks seek to use the API to achieve an impact such as DoS, data exfiltration, or code injection.

21
Q

Resource exhaustion

A

Resource exhaustion attacks take advantage of the limited resources that most modern computer systems have available for software applications.

Resource exhaustion essentially creates DoS condition, because the resources that are needed to execute actions associated with an application are entirely exhausted, leading to either an error, performance slowdown, or a DoS.

22
Q

Memory leak

A

Memory leaks are one example of resource exhaustion.

If an application requests memory from the operating system, it will then return the memory to the operating system for other uses.

In the case of an application with a memory leak, the application fails to return some memory that it no longer needs, perhaps by simply losing track of an object that it has written to a reserved area of memory.

If the application continues to do this over a long period of time, it can slowly consume all the memory available to the system, causing it to crash.

Rebooting the system often resets the problem, returning the memory to other uses but if the memory leak isn’t corrected, the cycle simply begins anew.

23
Q

Secure Socket Layer (SSL) stripping

A

SSL stripping attacks that downgrade your security from encrypted HTTPS to plain HTTP in order to gain access to the information that otherwise would have been sent securely.

24
Q

Driver manipulation
— Shimming
— Refactoring

A

Shimming, takes a legitimate driver and wraps a malicious driver around the outside of it.

Refactoring, if attackers have access to the driver’s source code, they can modify it to also include malware elements. Not easy to pull off.

25
Q

Pass the hash

A

Pass the hash is another form of replay attack that takes place against the operating system rather than a web application.

The attacker begins by gaining access to a Windows system and then harvests stored NTLM password hashed from that system. They can attempt to use these hashed to gain user or administrator access to that system or other systems in the same Active Directory domain.

NT Lan Manager