13C - Application Attack Indicators Flashcards

1
Q

What is an application attack?

A

An application attack targets a vulnerability in OS or application software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an application vulnerability?

A

An application vulnerability is a design flaw that can cause the application security system to be circumvented or that will cause the application to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main purpose of most application attacks?

A

To allow the threat actor to run their own code on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is arbitrary code execution?

A

The execution of code chosen by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is remote code execution?

A

When code is transmitted from one machine to another to be executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the main privileges required for an application or process?

A

To read and write data and execute functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens if a software exploit works?

A

The attacker may be able to execute arbitrary code with the same privilege level as the exploited process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is vertical privilege escalation?

A

Accessing functionality or data that should not be available, running code with higher SYSTEM privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is horizontal privilege escalation?

A

Accessing functionality or data intended for another user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What provides the simplest indicator of an application attack?

A

Privilege escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can process logging provide evidence of?

A

Privilege escalation attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a buffer in the context of application memory?

A

An area of memory that an application reserves to store some value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a buffer overflow vulnerability?

A

When an attacker passes data that fills the buffer and overwrites data at its start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a common type of buffer overflow?

A

Stack overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the stack in memory include?

A

A return address, which is the location of the program that called the subroutine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can an attacker do with a buffer overflow related to the return address?

A

Change the return address to run arbitrary code on the system.

17
Q

What mechanisms do operating systems use to mitigate risks from buffer overflow?

A
  • Address Space Layout Randomization (ASLR)
  • Data Execution Prevention (DEP)
18
Q

What is a Cross Site Request Forgery (CSRF) attack ?

A

A cross-site request forgery (CSRF) can exploit applications that use cookies to authenticate users and track sessions. To work, the threat actor must convince the victim to start a session with the target site.

If the target site assumes that the browser is authenticated because there is a valid session cookie and doesn’t complete any additional authorization process on the attacker’s input, it will accept the request as genuine. This is also referred to as a confused deputy attack.

19
Q

What is an XEE (XML External Entity) attack?

A

An XML External Entity (XXE) attack embeds a request for a local resource.

20
Q

What is a canonicalization attack?

A

An attack method where input characters are encoded in such a way as to evade vulnerable input validation measures. Examples of encoding schemes include HTML entities and character set percent encoding.

An attacker might be able to exploit vulnerabilities in the canonicalization process to perform code injection or facilitate directory traversal.

A limited input validation routine would prevent the use of the string ../ and refuse the request. If the attacker submitted the URL using the encoded version of the characters, they might be able to circumvent the validation routine.