1.3 Given a scenario, analyze potential indicators associated with application attacks Flashcards
What is privilege escalation?
Privilege escalation is a security vulnerability that allows an attacker to gain higher levels of access or permissions in a system or application.
What term describes the process of gaining higher levels of access or permissions in a system or application?
Privilege escalation
What is cross-site scripting (XSS)?
Cross-site scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
What term describes a vulnerability that allows attackers to inject malicious scripts into web pages?
Cross-site scripting (XSS)
What is SQL injection?
SQL injection is a type of attack where malicious SQL queries are inserted into input fields of web applications.
What term describes the insertion of malicious SQL queries into web application input fields?
SQL injection
What is a DLL injection?
DLL injection is a technique used by attackers to insert malicious code into running processes by loading a dynamic-link library (DLL) into the address space.
What term describes the technique of inserting malicious code into running processes by loading a dynamic-link library?
DLL injection
What is LDAP injection?
LDAP injection is a type of attack where attackers manipulate LDAP queries sent to directory services.
What term describes the manipulation of LDAP queries to gain unauthorized access or control?
LDAP injection
What is XML injection?
XML injection is a type of attack where attackers manipulate XML input data to exploit vulnerabilities in XML parsers or processors.
What term describes the manipulation of XML input data to exploit vulnerabilities?
XML injection
What is pointer/object dereference?
Pointer/Object dereference is a software vulnerability where a program attempts to access memory locations that have been freed or corrupted.
What term describes the vulnerability where a program tries to access memory locations that have been freed or corrupted?
Pointer/Object dereference
What is directory traversal?
Directory traversal is a type of attack where attackers exploit insufficient input validation to access files or directories outside of the intended structure.
What term describes the attack where attackers access files or directories outside the intended structure?
Directory traversal
What is a buffer overflow?
A buffer overflow is a type of software vulnerability where a program writes data beyond the boundaries of a buffer.
What term describes the vulnerability where a program writes data beyond the boundaries of a buffer?
Buffer overflow
What are race conditions?
Race conditions are software vulnerabilities that occur when the outcome of a program depends on the timing or sequence of events.
What term describes vulnerabilities where the outcome of a program depends on the timing of events?
Race conditions
What is error handling?
Error handling is the process of detecting, reporting, and responding to errors or exceptions that occur during program execution.
What term describes the process of detecting and responding to errors during program execution?
Error handling
What is improper input handling?
Improper input handling is a software vulnerability where applications fail to properly validate, sanitize, or encode user inputs.
What term describes the vulnerability where applications fail to properly validate user inputs?
Improper input handling