1.3 Given a scenario, analyze potential indicators associated with application attacks. Flashcards
Privilege escalation
Occurs when user obtains greater permissions or access
Cross-site scripting (XSS/CSS)
An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.
Persistent XSS
Stays on web server for future visitors
Reflective XSS
Occur when a malicious script is reflected off of a web application to the victim’s browser
Direct object model (DOM) XSS
Happens when a threat actor modifies the document object model (DOM) environment in the victim’s browser.
Performs all malicious actions w/o communicating w/ a web server
Protection methods (server-side)
Maintaining patched web server
Using WAFs
Operating host-based intrusion detection system (HIDS)
Auditing
Performing server-side input validation for length, malicious content, and escaping/filtering metacharacters
Protection methods (client-side)
System patching
AV
Avoid non-mainstream websites
Injections
Any exploitation allowing an attacker to submit code to target system to modify operations
Structured Query Language (SQL) Injection (SQLi)
Uses unexpected input to alter/compromise a web app
Protection methods:
Input sanitization
Dynamic-link library (DLL)
Collection of code designed to be loaded and used as needed by a process
Performs common functions and widely used
Dynamic-link library (DLL) injection
Manipulating a process’s memory to load additional code, performing operations not intended
Performed by replacing a valid DLL file w/ modified one OR manipulating an active process into using a malicious DLL
Protection methods to Dynamic-link library (DLL) injection:
Hard code DLL calls into an app rather than allowing OS to select DLLs
Lightweight Directory Access Protocol (LDAP) injection
Vulnerability in which queries are constructed from untrusted input without prior validation or sanitization
Protection methods:
Input sanitization
Lightweight Directory Access Protocol (LDAP) is a common software protocol designed to enable anyone on a network to find resources such as other individuals, files, and devices.
Extensible Markup Language (XML) injection
a type of attack that targets web applications that generate XML content.
Pointer/object dereference
An operation that allows you to access the value stored at the memory address pointed to by a pointer
Directory traversal
Attack enabling movement into other portions of filesystem hosted by web server’s host OS
Commonly achieved by manipulating the URL