(7) Infrastructure and Op Tech Flashcards

1
Q

What are examples of Operational Technology (OT)?

A

OT are examples of Supervisory Control and Data Acquisition (SCADA) systems, Industrial Control Systems (ICs), and Internet of Things (IoT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are injection flaws?

A

Injection flaws happen when an attacker is able to send commands through a web server to a backend system, passing normal security and tricking the back end system to believing that the request came from the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a SQL injection attack?

A

SQL injection attack is when a web application is taken advantage of to send unauthorized commands to a backend database server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name and describe the two best ways to protect against SQL injection attacks?

A

The two best ways are input validation and enforcement of least privilege restrictions on access to the database.

Input validation makes sure that users don’t provide unexpected text to the web server. It blocks input that could cause private information from being shared.

Least privilege limits the tables that the web server can access in order to keep that information from being shared over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Other than attacks on SQL databases, what other two attacks should security researchers be aware of?

A

Security professionals should also be aware of Extensible Markup Language (XML) and Lightweight Directory Access Protocol (LDAP) based attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Once developers notice or detect that a SQL vulnerability has been detected, what should they do?

A

Developers should work closely with developers to get the vulnerability fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a cross-site scripting (XSS) attack?

A

XXS attacks are when an attacker puts scripting commands on a website that will be executed at a later time by an unsuspecting visitor accessing the site.

The main goal is to deceive the user into visiting a legit site and then to execute bad code that is put there by a bad third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are persistent cross site scripting XSS attacks?

A

Persistent XSS Attacks happen when the attacker can store the attack code on a server. The code stays on the server, awaiting for a user to get to the bad content. They are also known as stores XSS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are reflected Cross Site Scripting (XSS) attacks?

A

Reflected Cross Site Scripting attacks happen when the attacker tricks the user into sending the attack to the server as part of a normal query string, etc.

The server then sends the attack back to the person who sent it (reflecting it), forcing the code to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should security admins do if they discover a XSS vulnerability?

A

Security professionals should work with developers to figure out if this vulnerability actually exists and then put controls in place to keep this attack from happening, perhaps through input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a directory traversal attack? What causes these attacks to happen?

A

A directory traversal attack inserts a filesystem path into a query string, trying to navigate to a file in an area not normally authorized for access to the public.

These attacks happen if filenames are included in query strings such as if one types www.coolserver.net/documents/payroll?document=’payrolldatabase.pdf’

An attacker could use this type of attack to work through various directories, looking for specific high value information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What three types of controls can help avoid directory traversal attacks?

A

The three types of controls that can help avoid directory traversal attacks are:

Avoid using filenames in user-manipulatable fields

Input validation should prevent the use of special characters needed to pull this type of attack off

Access controls on storage servers should keep the web server from being able to access these types of files for public access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a file inclusion attack?

A

File inclusion attacks seek to trick the web server into executing arbitrary code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two types of file inclusion attacks?

A

The two types of file inclusion attacks are

Local File Inclusion (LFI) attacks which try to run code stored in a file located on a web server somewhere. Similar to directory traversal attacks.

Remote File Inclusion (RFI) attacks let the attacker execute code that is stored on a server that is remote.

^^^RFI attacks are very dangerous because they allow the attacker to control the executed code without having to store a file on the server locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When attackers discover a file inclusion weakness, what do they normally like to do?

A

Attackers like to install a web shell when they discover a file inclusion weakness because it lets them run commands on the server and then they can look at them in a browser directly.

This lets the attacker use HTTP and HTTPS and avoid detection by security scanners.

The attacker may also fix the detected vulnerability in order to keep another attacker out and/or to keep the security team from figuring out what is going on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a request forgery attack?

A

Request forgery attacks take advantage of trust relationships and try to have users unknowingly run commands against a remote computer

The two forms are cross site request forgery and server side request forgery

17
Q

What is cross site request forgery (XSRF or CSRF)?

A

XSRF or CSRF attacks take advantage of trust that independent sites have on a user system to run commands on behalf of the user.

Example a user is signed into their bank. The attacker puts a link on a forum website with a link. The user clicks it, and as long as the user is signed into their bank, the link may contain a command to transfer money to the attackers account. If the user is indeed signed into their bank, the attack may succeed.

18
Q

What can developers do to prevent Cross Site Request Forgery (CSRF/XSRF) attacks?

A

Developers can prevent these attacks is to create web apps that use secure tokens that the attacker would not know about so therefore the tokens wouldn’t be in the link.

Another way is to check the URL that is referring the request and only accept requests that come from their own site

19
Q

What is Server Side request forgery (SSRF)?

A

SSRF attacks deceive a server into visiting a URL based on user supplied input.

These attacks are possible when a web app takes URLs from a user as input and then gets info from that URL. If the server has access to non public URLs then an SSRF attack can accidentally disclose that information to an attacker