13B: Launch Session Attacks Flashcards

3.3 Given a scenario, research attack vectors and perform application-based attacks.  3.7 Given a scenario, perform post-exploitation techniques.

1
Q

A malicious actor steals a user’s session credential then uses it to impersonate the user.

A

session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Text file used to store information about a user when they visit a website. Some sites use these to support user sessions.

A

cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack that forces a user to browse a website in the context of a known and valid session.

A

session fixation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This requires having access to the user authentication process itself, so that it can be intercepted and repeated.

A

session replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.

A

cross site request forgery (CSRF/XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack where an attacker takes advantage of the trust established between the server and the resources it can access, including itself.

A

server site request forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CompTIA definition: When a user accesses or modifies specific resources that they are not entitled to.
AKA: This type of privilege escalation involves gaining access to the rights of another account—human or machine—with similar privileges.

A

horizontal escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When an attacker can perform functions that are normally assigned to users in higher roles, and often explicitly denied to the attacker.

A

vertical escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerabilities that arise from implementation and design issues that lead to unintended behavior.

A

business logic flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly