1.3 Given a scenario, analyze potential indicators assoicated with application attacks Flashcards
Privilege escalation
An attacker exploits a bug within an application to bypass the application and gain elevated privileges that enable the attacker to execute system commands.
Protection against privilege escalation requires that programmers use input validation and test their code for bugs and exploits before releasing the software.
Cross-site scripting (XSS)
Cross-site scripting (XSS) is a type of website application vulnerability that allows malicious users to inject malicious code into dynamic websites that rely on user input.
Injections
Injections insert code into a running process, forcing a program to behave in a manner that it was not intended to do.
- Structured query language (SQL)
- Dynamic Link Library
- Lightweight Directory Access Protocol
- XML injections
Structured query language (SQL) Injection
The attacker sends SQL input to the database via an input form. The results returned to the attacker are responses to those commands, giving the attacker access to information stored within the database that shouldn’t be available to the attacker.
Dynamic Link Library (DLL) injection
DLL injections exploit DLLs by inserting code into a DLL and then having the original process load and execute the code within the DLL.
Lightweight Directory Access Protocol (LDAP) injection
Which is like a SQL injection attack, inserts code into user-based input that is utilized in a query to an LDAP server.
Extensible Markup Language (XML) injections
Can modify how an XML application processes data. By injections into the XML application, the attacker causes the application to process data according to the malicious injected XML code.
Pointer/object dereference
An attack that consists of finding null references in a target program and dereferencing them, causing an exception to be generated.
Dereferencing means taking away the reference and giving you what it was actually referring to.
The vulnerability in memory that usually causes the applications to crash or a denial of service is a Null Pointer dereference.
In this case, there is nothing at that memory address to dereference and the application crashes.
Directory Traversal
A type of access vulnerability that enables a hacker to get unauthorized access to files on a web server other than the public files that are served on the website.
Buffer overflow
Buffer overflow is a programming term used to describe when input data exceeds the limits recognized by a program.
In a buffer overflow attack, the extra characters are malicious code that causes the program or even the entire system to crash.
Race conditions
—Time of check/time of use
Race condition happens when an application is dependent on the steps to be performed in an appropriate order, and the steps are subsequently then executed out of order, creating a crash or other negative situation that can be exploited by an attacker.
Time of check/time of use, this condition occurs when Step A occurs and then the state changes before the use of that authentication occurs.
Time of check/time of use (TOC/TOU) issue is a race condition that occurs when a program checks access permissions too far in advance of a resource request.
Error handling
Error handling could ensure that out-of-range numerical values are handled in safer ways, such as by converting the value to text, truncating or converting it, or ignoring unexpected values.
Improper input handling
Improper input handling that allows so much data to be entered into the application that the processing limits are exceeding.
Replay attacks
An attempt to reuse authentication requests.
Occurs when an unauthorized user captures network traffic and then sends the communication to its original destination, acting as the original sender.
To prevent replay attacks, you can implement time stamps, sequence numbers, or randomized session IDs.
Replay attacks
— Session replays
Session replay, an attacker steals a valid session ID of a user and reuses it to impersonate an authorized user and perform fraudulent transactions or activities.
Preventing session replay, disallow session ID use in web apps