2: 3 Application Attacks Flashcards

1
Q

OWASP

A

Open Web Application Security Project: maintains a top 10 application security list that all sec professionals should be aware of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Injection Flaws

A

insert unwanted code that a website will then run, SQLInjection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SQL

A

Structured Query Language - request data from database that applications often use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQLInjection

A

Changes to SQL that can change the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ways to protect against Injection Flaws

A

Input Validation, Parameterized SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Broken Authentication

A

Flaws in a websites authentication process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive Data Exposure

A

discloses confidential information to the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Broken Access Controls

A

Provides unauthorized access, insecure Direct Object References
Manually brute forcing IDs when they shouldn’t be able to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Misconfigurations

A

Can jeopardize systems - web servers, application servers, firewalls, other components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XSS

A

Cross Site Scripting - Scripts embedded in 3rd party system that executes in browser of victims, targets HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protect against XSS

A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application Hardening

A

ensuring apps are safe against attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are different ways to harden an application

A

Proper authentication, encryption, validate user inputs, avoid and remediate known exploits, deploy obfuscation and camouflaged to hide source code details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ERP system

A

encryption type, user access type, types of access granted, and security of underlying infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSRF

A

Cross Site Request Forgery - Use 1 site to trick a users browser to send info from one site to another (multiple tabs communicate each other). XSRF secretly sends requests without users knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSRF

A

Variant of CSRF that is server sided - pretending to be a trusted server to manipulate server

17
Q

Directory Traversal attacks

A

manipulate file structure on a server using linux commands

18
Q

Best way to beat Directory Traversal attacks

A

Input validation, strict file access control

19
Q

Overflow Attacks

A

Target the memory set aside to store user variable content, large inputs yield unexpected behavior, getting dangerous result

20
Q

Best way to beat Overflow Attacks

A

Input validation

21
Q

Cookies and attachments

A

Track behavior across multiple websites

22
Q

Guessable Cookies

A

Using known changes in the format of the cookies - dangerous

23
Q

Cookie Guessing

A

Attempting to breach cookies by changing their value

24
Q

Session Replay Attacks -

A

possible cookie values are not encrypted in transit

Protect by making cookies secure

25
Q

Code Execution Attacks

A

attack exploits vulnerabilities that allows them to run code

26
Q

Privilege Escalation Attack

A

Takes a normal user account and transforms them to those with admin rights

27
Q

What are the ways to protect against a privilege escalation attack

A

Input Validation, Patch OS and apps, Enforce principle of least privilege, Use DEP and ASLR Technologies

28
Q

Driver Manipulation

A

Installing Malicious drivers/modifying existing drivers to access drivers that have low level access to the OS

29
Q

Shimming

A

Wraps legit driver with a malicious shim, does not require access to source code

30
Q

Code Signing

A

Digital sign of driver that validates functions

31
Q

Memory Overflow

A

Allows arbitrary code execution

32
Q

Resource Exhaustion

A

Slows down/disables system

33
Q

Memory Leak

A

Fails to release memory for reuse

34
Q

Memory Pointer

A

Area of memory that stores the address of another location in memory

35
Q

Null-pointer dereferencing

A

Causes Application to Crash

36
Q

DLL lnjection

A

Trick an application into loading malicious code i.e. library

37
Q

Race Conditions

A

Proper Functions of a security controls depends upon the timing of actions i.e. accessing the same bank account

38
Q

Best ways to protect against a Time of Use/Time of Check vulnerability

A

Using a lock that prevents two people from accessing the same account