13C: Plan Injection Attacks Flashcards
2.2 Given a scenario, perform active reconnaissance. 3.3 Given a scenario, research attack vectors and perform application-based attacks. 3.5 Explain common attacks and vulnerabilities against specialized systems
An attack that injects a database query into the input data directed at a server by accessing the client side of the application.
SQLi attack
The process of injecting SQL queries when the web application’s response does not contain the result of the query.
blind sqli
The process of injecting SQL queries with values that are always true (‘1=1’) and false (‘1=2’).
boolean based sqli
The process of injecting SQL queries with time delays
time based sqli
CompTIA definition: An application attack that allows access to commands, files, and directories that may or may not be connected to the web document root directory. (really with this type of exploit, you are trying to access upstream directories from where your current access lies by using commands such as ..)
directory traversal
A character with a value of zero that is used in most programming languages to indicate the termination of a string.
null byte
Exploit technique that runs malicious code with the ID of a legitimate process.
code injection
This is a type of web application vulnerability where a threat actor is able to execute arbitrary shell commands on a host via a vulnerable web application.
command injection
Faults in the information transmitted, stored, or otherwise managed by IoT devices.
IoT data corruption
Network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.
lightweight directory access protocol (LDAP)
A malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.
cross site scripting (XSS)
When an attacker injects malicious code or links into a website’s forums, databases, or other data.
persistent attack
A malicious request to a legitimate server is created and sent as a link to the victim, so that a server-side flaw causes the malicious component to run on the target’s browser.
reflected attack
When attackers send malicious scripts to a web app’s client-side implementation of JavaScript to execute their attack solely on the client.
Document Object Model (DOM)-based attack