1.3 Potential Indicators - Associated with Application Attacks Flashcards
Threats, Attacks, and Vulnerabilities: Analyze potential indicators associated with application attacks
1
Q
Privilege escalation
A
- Important to patch quickly
- Anti virus/ malware should be aware of these vulnerabilities
- OS may have safeguards in place to prevent Privilege Escalation (ex: Data Execution Prevention)
2
Q
Data Execution Prevention
A
- Only data in executable areas can run
- Ex: data in the data section can’t run
3
Q
Address Space Layout Randomization
A
- Prevention tactic for privilege escalation
- Randomizes where information is stored in memory so if a hacker finds a way to take advance of a memory address on one system, they couldn’t duplicate it on another OS
- Prevent a buffer overrun at a known memory address
4
Q
Horizontal level access
A
- Another type of privilege escalation
5
Q
CVE 2020-1530
A
- Windows Remote Access of Elevation of Privilege vulnerability
- August 20, 2020 (affected Server 2008, 2012, 2016, 2019 and Windows 7, 8.1, 10)
- Specific to remote access on Windows, it affected many different OS going back many years
- The attacker would only need to run one program and they would have elevated access
6
Q
Cross-site scripting
A
- XSS (Not CSS)
- Originally associated with a browswer vulnerability that allowed information from one site could be shared with another
- These days now this can mean information from one site shared with an attacker
- One of the most common web application development errors
- Takes advantage of the trust a user has for a site
- Very common vulnerability
- Malware also uses JavaScript with a vulnerable website to gather information from your computer
7
Q
Non-persistent (reflected) XSS attack
A
- Found on a website that allows someone to run scripts on input boxes (ex: search field)
- Attacker needs the victim to click a specific type of link (this will start the reflected XSS). Targeted attack.
- Whatever the output / payload from the event is sent to attacker
- Often it’s session ids/ user credentials
- Very sneaky
8
Q
Persistent (stored) XSS attack
A
- Stored permanently on server and anyone visiting that page would be running script
- Often will see on sits that have a forum / messages and the XSS attack is embedded on post
- everyone who reads post will be infected
- anyone can run the script
- can spread very quickly when combined with social media sharing / liking
9
Q
Reflected vs stored XSS attack
A
- Reflected (non-persistent), targeted, user must click a specific link
- Stored XSS, can spread quickly b/c non targeted and anyone who visits a site is attacked
10
Q
Protecting yourself against XSS
A
- Never blindly click a link in your email inbox.
- Consider disabling JavaScript (or more realistically, get more control of your JavaScript through an extension)
- Keeping browswer up to date since many vulnerabilities are through the browser
- developers should validate all input fields
11
Q
Injection attacks
A
- When an attacker puts their own code into a data stream
- Often enabled b/c of bad programming b/c you shouldn’t be able to do this (application should properly handle input / output)
- Many different types of code you can inject: Html, SQL, XML, LDAP
12
Q
SQL Injection
A
- Very common type of injection
- If you can circumvent the front end you can gain access to the DB
- By slightly modifying inputs you can query or update a db from the front end (ex: ‘Or 1 =1’)
13
Q
XML Injection
A
- Extensible Markup Language
- Commonly used to transfer data b/n two different types of devices
- XML injections sends malformed XML off to another device
- a set of rules for data transfer and storage
- a good application would validate XML
14
Q
LDAP Injection
A
- LDAP (Lightweight Directory Access Protocol) server
- Commonly used to store information about authentication, like user name / password
- If you can inject data and gather information about authentication you can get a lot of sensitive info
- Created by telephone companies, now used by almost everyone
15
Q
DLL Injection
A
- Dynamic Link Library
- A windows library containing code and data
- A way to inject code into application and have code execute for us
- Ex: Process B (attacker) and Process A (victim). Process B will attach to first process and allocate memory for this DLL library and then copy DLL into Process A. Process A will execute as a new thread, running as Process A (which might have additional rights/ capabilities)