1.3 Given a scenario, analyze potential indicators associated with application attacks Flashcards

1
Q

Privilege Escalation

A

Gain higher-level access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privilege Escalation

A

When a user grants themselves HIGHER security privileges than they are supposed to have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cross-site Scripting (XSS)

A

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cross-site request forgery (XSRF or CSRF)

A

exploits trust that a user has in a website to execute code on
the user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic-link library (DLL)

A

Attacker injects a code and the application runs it for the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lightweight Directory Access Protocol (LDAP)

A

This can occur when the user’s input is not properly filtered, and the result can be executed commands, modified content, or results returned to unauthorized queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Markup Language (XML)

A

when users enter values that query XML (known as XPath) with values that take advantage of exploits, it is known as an XML injection attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL injection attacks

A

“1+1” input on a web app
Use unexpected input to a web application to gain
unauthorized access to an underlying database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Point/Object Deference

A

An attack that consists of finding null references in a target program
and dereferencing them, causing an exception to be generated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Directory Traversal

A

If an attacker is able to gain access to restricted directories through
HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Buffer Overflow

A

appropriate size (allows Input that is too large can “overflow” memory buffer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Race Conditions

A

A condition where the system’s behavior is dependent on the
sequence or timing of other uncontrollable events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Error Handling

A

the user will simply see an error message box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Replay Attack

A

an attempt to reuse authentication
requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Session Replay

A

an attacker steals a valid session ID of a
user and reuses it to impersonate an

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integer Overflow

A

A type of arithmetic overflow error when the result of an integer operation does not fit within the allocated memory space.

17
Q

resource exhaustion

A

When an application continuously allocates additional resources,
exhausting machine resources, leading the system to hang or crash.

18
Q

Application
programming interface (API)

A

Attempts to manipulate the application
programming interface (API)

19
Q

Memory Leak

A

Memory leaks are usually caused by failure to deallocate
memory that has been allocated.

20
Q

secure sockets layer (ssl) stripping

A

A technique by which a website is downgraded from https to http

21
Q

Shimming

A

A
shim is a small library that is created to intercept API calls transparently and

22
Q

Refactoring

A

The name given to a set of techniques used to identify the flow and then modify
the internal structure of code without changing the code’s visible behavior.

23
Q

Pass the Hash

A

a technique whereby an attacker captures a password hash (as opposed to the
password characters) and then passes it through for authentication and lateral access

24
Q

Non-persistent XSS Attack

A

Scripts ran through a search box and is started by a a user CLICKING a EMAIL.

25
Q

Persistent XXS attack

A

Attacker makes a post with a malicious/script and anyone that clicks or visits the page are a victim

26
Q

Persistent XXS attack

A

Attacker makes a post with a malicious/script and anyone that clicks or visits the page are a victim