1.3 Given a scenario, analyze potential indicators associated with application attacks Flashcards
What is privilege escalation?
Privilege escalation is a security vulnerability that allows an attacker to gain higher levels of access or permissions in a system or application.
What term describes the process of gaining higher levels of access or permissions in a system or application?
Privilege escalation
What is cross-site scripting (XSS)?
Cross-site scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
What term describes a vulnerability that allows attackers to inject malicious scripts into web pages?
Cross-site scripting (XSS)
What is SQL injection?
SQL injection is a type of attack where malicious SQL queries are inserted into input fields of web applications.
What term describes the insertion of malicious SQL queries into web application input fields?
SQL injection
What is a DLL injection?
DLL injection is a technique used by attackers to insert malicious code into running processes by loading a dynamic-link library (DLL) into the address space.
What term describes the technique of inserting malicious code into running processes by loading a dynamic-link library?
DLL injection
What is LDAP injection?
LDAP injection is a type of attack where attackers manipulate LDAP queries sent to directory services.
What term describes the manipulation of LDAP queries to gain unauthorized access or control?
LDAP injection
What is XML injection?
XML injection is a type of attack where attackers manipulate XML input data to exploit vulnerabilities in XML parsers or processors.
What term describes the manipulation of XML input data to exploit vulnerabilities?
XML injection
What is pointer/object dereference?
Pointer/Object dereference is a software vulnerability where a program attempts to access memory locations that have been freed or corrupted.
What term describes the vulnerability where a program tries to access memory locations that have been freed or corrupted?
Pointer/Object dereference
What is directory traversal?
Directory traversal is a type of attack where attackers exploit insufficient input validation to access files or directories outside of the intended structure.
What term describes the attack where attackers access files or directories outside the intended structure?
Directory traversal
What is a buffer overflow?
A buffer overflow is a type of software vulnerability where a program writes data beyond the boundaries of a buffer.
What term describes the vulnerability where a program writes data beyond the boundaries of a buffer?
Buffer overflow
What are race conditions?
Race conditions are software vulnerabilities that occur when the outcome of a program depends on the timing or sequence of events.
What term describes vulnerabilities where the outcome of a program depends on the timing of events?
Race conditions
What is error handling?
Error handling is the process of detecting, reporting, and responding to errors or exceptions that occur during program execution.
What term describes the process of detecting and responding to errors during program execution?
Error handling
What is improper input handling?
Improper input handling is a software vulnerability where applications fail to properly validate, sanitize, or encode user inputs.
What term describes the vulnerability where applications fail to properly validate user inputs?
Improper input handling
What is a replay attack?
A replay attack is a type of attack where attackers capture and replay valid data transmissions or authentication messages.
What term describes the attack where valid data transmissions are captured and replayed to gain unauthorized access?
Replay attack
What is an integer overflow?
An integer overflow is a software vulnerability where arithmetic operations on integers result in a value that exceeds the maximum representable value.
What term describes the vulnerability where arithmetic operations result in values exceeding the maximum representable value?
Integer overflow
What are server-side request forgeries?
Server-side request forgeries are a type of attack where attackers trick a server into making unauthorized requests on behalf of authenticated users.
What term describes the attack where servers are tricked into making unauthorized requests on behalf of authenticated users?
Server-side request forgeries
What are cross-site request forgeries?
Cross-site request forgeries are a type of attack where attackers trick users into making unintended HTTP requests to web applications.
What term describes the attack where users are tricked into making unintended requests to web applications?
Cross-site request forgeries
What are API attacks?
API attacks are malicious activities targeting application programming interfaces (APIs) to exploit vulnerabilities.
What term describes malicious activities targeting application programming interfaces?
API attacks
What is resource exhaustion?
Resource exhaustion is a type of attack where attackers consume system resources to disrupt service availability.
What term describes the attack where system resources are consumed to disrupt service availability?
Resource exhaustion
What is a memory leak?
A memory leak is a software defect where a program fails to release memory that is no longer needed.
What term describes the software defect where memory is not released after it’s no longer needed?
Memory leak
What is SSL stripping?
SSL stripping is a type of attack where HTTPS connections are downgraded to HTTP, exposing sensitive information.
What term describes the attack where HTTPS connections are downgraded to HTTP, exposing sensitive information?
SSL stripping
What is driver manipulation via shimming?
Driver manipulation via shimming is a technique used by attackers to intercept and modify system calls made by device drivers.
What term describes the technique of intercepting and modifying system calls made by device drivers?
Driver manipulation via shimming
What is driver manipulation via refactoring?
Driver manipulation via refactoring is a technique used by attackers to modify the code of device drivers to introduce vulnerabilities.
What term describes the technique of modifying device driver code to introduce vulnerabilities or malicious functionality?
Driver manipulation via refactoring
What is pass the hash?
Pass the hash is a type of attack where hashed credentials are captured and reused to authenticate to other systems.
What term describes the attack where hashed credentials are captured and reused to authenticate to other systems?
Pass the hash