2: 3 Application Attacks Flashcards
OWASP
Open Web Application Security Project: maintains a top 10 application security list that all sec professionals should be aware of
Injection Flaws
insert unwanted code that a website will then run, SQLInjection
SQL
Structured Query Language - request data from database that applications often use
SQLInjection
Changes to SQL that can change the password
Ways to protect against Injection Flaws
Input Validation, Parameterized SQL
Broken Authentication
Flaws in a websites authentication process
Sensitive Data Exposure
discloses confidential information to the public
Broken Access Controls
Provides unauthorized access, insecure Direct Object References
Manually brute forcing IDs when they shouldn’t be able to
Security Misconfigurations
Can jeopardize systems - web servers, application servers, firewalls, other components
XSS
Cross Site Scripting - Scripts embedded in 3rd party system that executes in browser of victims, targets HTML
Protect against XSS
Input Validation
Application Hardening
ensuring apps are safe against attacks
What are different ways to harden an application
Proper authentication, encryption, validate user inputs, avoid and remediate known exploits, deploy obfuscation and camouflaged to hide source code details
ERP system
encryption type, user access type, types of access granted, and security of underlying infrastructure
CSRF
Cross Site Request Forgery - Use 1 site to trick a users browser to send info from one site to another (multiple tabs communicate each other). XSRF secretly sends requests without users knowledge