1.3 potential indicators associated with application attacks Flashcards
Cross-site scripting
XSS
attacker injects malicious executable scripts into the code of a trusted application or website. Initiated by email.
scripts run in user input boxes and steals info
SQL Injection
malicious SQL code for backend database manipulation to access information that was not intended to be displayed
DLL injection
Dynamic-link library in Windows
A DLL is a file type that contains code, data, and resources that can be shared among multiple programs
DLL injection is often used by external programs to influence the behavior of another program in a way its authors did not anticipate or intend.
LDAP injection
Lightweight Directory Access Protocol
manipulates Active Directory application results
XML injection
Extensible Markup Language
Stores, transmits, and reconstructs data. It’s a set of rules for encoding documents in a format for humans and machines.
Manipulates XML application or document.
Pointer/object dereference
the process of accessing the value stored at the memory address pointed to by the pointer. This allows you to work with the actual data rather than just the memory location.
A null pointer dereference can lead to program crashes and other unpredictable behavior. It can also allow a local user to crash the system or potentially cause a denial of service.
Race conditions
Time of check/time of use TOCTOU
something happens between TOC and TOU
Replay attack
a type of network attack in which an attacker captures a valid network transmission and then retransmit it later. The main objective is to trick the system into accepting the retransmission of the data as a legitimate one.
use salt or encryption to avoid
Integer overflow
Inserts a number that is too large which causes memory to crash
API attacks
an attempt by a malicious actor to gain unauthorized access to an API to break into a system or network, or transfer data.
Memory leak
use all available memory to crash system
Driver shimming
filling space between old application and different windows versions
Pass the hash
attacker captures a password hash (as opposed to the password characters) and then passes it through for authentication and lateral access to other networked systems.
sidejacking
UNSECURED WIFI EAVESDROPPING
attacker intercepts and steals sensitive information, such as login credentials, by eavesdropping on communication between two parties. This often occurs on unsecured Wi-Fi networks, allowing the attacker to “sidejack” the session and gain unauthorized access to accounts or data.
SSRF
Server-side request forgery
a web security vulnerability that allows an attacker to make requests from a server to unintended locations