1.3 Given a scenario, analyze potential indicators associated with application attacks. Flashcards

1
Q

Privilege escalation

A

Occurs when user obtains greater permissions or access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cross-site scripting (XSS/CSS)

A

An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Persistent XSS

A

Stays on web server for future visitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reflective XSS

A

Occur when a malicious script is reflected off of a web application to the victim’s browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Direct object model (DOM) XSS

A

Happens when a threat actor modifies the document object model (DOM) environment in the victim’s browser.

Performs all malicious actions w/o communicating w/ a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protection methods (server-side)

A

Maintaining patched web server

Using WAFs

Operating host-based intrusion detection system (HIDS)

Auditing

Performing server-side input validation for length, malicious content, and escaping/filtering metacharacters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protection methods (client-side)

A

System patching

AV

Avoid non-mainstream websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Injections

A

Any exploitation allowing an attacker to submit code to target system to modify operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Structured Query Language (SQL) Injection (SQLi)

A

Uses unexpected input to alter/compromise a web app

Protection methods:
Input sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dynamic-link library (DLL)

A

Collection of code designed to be loaded and used as needed by a process

Performs common functions and widely used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dynamic-link library (DLL) injection

A

Manipulating a process’s memory to load additional code, performing operations not intended

Performed by replacing a valid DLL file w/ modified one OR manipulating an active process into using a malicious DLL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protection methods to Dynamic-link library (DLL) injection:

A

Hard code DLL calls into an app rather than allowing OS to select DLLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lightweight Directory Access Protocol (LDAP) injection

A

Vulnerability in which queries are constructed from untrusted input without prior validation or sanitization

Protection methods:
Input sanitization

Lightweight Directory Access Protocol (LDAP) is a common software protocol designed to enable anyone on a network to find resources such as other individuals, files, and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Extensible Markup Language (XML) injection

A

a type of attack that targets web applications that generate XML content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pointer/object dereference

A

An operation that allows you to access the value stored at the memory address pointed to by a pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Directory traversal

A

Attack enabling movement into other portions of filesystem hosted by web server’s host OS

Commonly achieved by manipulating the URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Buffer overflows

A

Memory exploitation taking advantage of software lack of input length validation

This results in extra data “overflowing” assigned memory buffer and overwriting memory in adjacent locations

18
Q

Protection methods to buffer overflow

A

Input validation checks in code

Data execution prevention (DEP)
-Blocks execution of code stored in areas of memory designated as data-only areas

Address space layout randomization (ASLR)
-Ensures various elements of OS are loaded into randomly assigned memory at bootup

No-eXecute (NX) bit
-Bit used to segregate memory into an area to store code and another to store data

19
Q

Race conditions

A

Attack based on predictability of task execution or timing of execution

20
Q

Protection methods to race condition

A

Locking resources to be used, and unlocking them in reverse order

21
Q

Time of check/time of use (TOCTTOU or TOC/TOU)

A

Attacker racing with legitimate process to replace the object before it is used

22
Q

Error handling

A

May allow for leaking of essential information to attackers or enable attacker to force a system into an insecure state

23
Q

Fail-secure system

A

Reverting to a second, closed, protective state in event of failure, rather than open and insecure state where info can be disclosed/modified

24
Q

Protection methods to Error handling

A

Only give essential information to administrators, giving generic messages to unauthorized users

25
Q

Improper input handling

A

When app is designed to simply accept whatever data is submitted w/o validation/sanitization.

26
Q

Input validation

A

Checking input received before it’s allowed to be processed

27
Q

Replay attack

A

Attacker capturing network traffic, replaying captured traffic in attempt to gain unauthorized access

Mostly related to legacy systems/services

Most modern authentication systems use packet sequencing, time stamps, challenge-response, and ephemeral session encryption

28
Q

Session replay

A

Recording a victim’s activities, then replaying that session for troubleshooting

29
Q

Integer overflow

A

When a mathematical operation attempts to create a numeric value too large to be contained or represented by allocated storage/memory structure

30
Q

Request forgeries

A

Exploitations making malicious requests of a service, masquerading as legit or from a legit source

31
Q

Server-side request forgery (SSRF)

A

Where a vulnerable server is coerced into functioning as a proxy, exploiting trust relationships between servers and clients

32
Q

Cross-site request forgery (XSRF) aka Client-side request forgery (CSRF)

A

Similar to XSS, but focused on the visiting user’s web browser more than the website being visited

Purpose is to trick the user or user’s browser into performing actions not intended or unauthorized

33
Q

Application programming interface (API) attacks

A

Malicious usage of software through its API

API is how software communicates with other software for info exchange

Includes injection attacks, XSS, CSRF, SSRF, buffer overflows, race conditions, replay attacks, request forgery, etc.

34
Q

Resource exhaustion

A

A system or system user uses up all the available resources that the system has, leading it to be completely drained.

35
Q

Memory leak

A

Occurs when program fails to release memory or continues to consume more memory

36
Q

Secure Sockets Layer (SSL) stripping

A

On-path attack preventing negotiation of strong encryption between client and server

SSL is outdated, this term still is used for TLS stripping

37
Q

Driver manipulation

A

When a malicious actor crafts system or device driver behaving differently based on certain conditions

Can be implemented by original vendor or third party, whether legit or attacker

38
Q

Shimming

A

Means of injecting alternate or compensation code into a system to alter operations w/o changing original code

39
Q

Shim

A

Small software library able to intercept API calls and modifies content passed on to target

Can effect driver manipulation

40
Q

Refactoring

A

Restricting or reorganizing software code w/o changing externally perceived behavior or produced results
Focus on improving software’s nonfunctional elements

41
Q

Pass the hash

A

a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it to create a new user session on the same network