Application Attack 2.4 Flashcards
1
Q
Injection Attack
A
- Attackers adding their own information to the data stream.
2
Q
Causes for Injection Attack
A
- Enabled because of bad programming.
- Application should properly handle input and output.
3
Q
Different Types of Injection Attack
A
- Structure Query Language (SQL)
- Extensible Markup Language (XML)
- Hyper Text Markup Language (HTML)
- Lightweight Directory Access Protocol (LDAP)
4
Q
Buffer Overflows
A
- Overwriting a buffer of memory which spills over into other memory.
- Not a simple exploit, takes time to implement.
5
Q
Privilege Escalation
A
- The attacker gains root- or admin- level access due to an exploit or thru a design flaw.
- Would allow more capabilities
6
Q
Horizontal Privilege Escalation
A
- Attacker expands their privilege escalation by taking over another account.
- Misuses the privileges of another user.
7
Q
Vertical Privilege Escalation
A
- Attacker attempts to gain more permissions or access.
- Uses the already compromised account.
8
Q
Mitigating Privilege Escalation
A
- Fix the vulnerability
- Update anti-virus/malware software
- Only data in executable areas can run
- Prevent a buffer overrun at a known memory address.
9
Q
Cross-Site Requests Forgery
A
- Known as XSRF, CSRF (sea surf)
- Takes advantage of a web browser’s trust that a web application has for the user.
10
Q
Directory Traversal Attack
A
- Reads files from a web server that are outside of the websiteTa’s file directory.
- Attacker uses special inputs circumvent the directory.
11
Q
Cryptographic Attacks
A
- Takes advantage of the user’s trust in the results without valid reasons.
- Algorithmic weakness can be exploited or overlooked by developers.