Application Attack 2.4 Flashcards

1
Q

Injection Attack

A
  • Attackers adding their own information to the data stream.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Causes for Injection Attack

A
  • Enabled because of bad programming.
  • Application should properly handle input and output.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Different Types of Injection Attack

A
  • Structure Query Language (SQL)
  • Extensible Markup Language (XML)
  • Hyper Text Markup Language (HTML)
  • Lightweight Directory Access Protocol (LDAP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Buffer Overflows

A
  • Overwriting a buffer of memory which spills over into other memory.
  • Not a simple exploit, takes time to implement.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privilege Escalation

A
  • The attacker gains root- or admin- level access due to an exploit or thru a design flaw.
  • Would allow more capabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Horizontal Privilege Escalation

A
  • Attacker expands their privilege escalation by taking over another account.
  • Misuses the privileges of another user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vertical Privilege Escalation

A
  • Attacker attempts to gain more permissions or access.
  • Uses the already compromised account.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mitigating Privilege Escalation

A
  • Fix the vulnerability
  • Update anti-virus/malware software
  • Only data in executable areas can run
  • Prevent a buffer overrun at a known memory address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cross-Site Requests Forgery

A
  • Known as XSRF, CSRF (sea surf)
  • Takes advantage of a web browser’s trust that a web application has for the user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Directory Traversal Attack

A
  • Reads files from a web server that are outside of the websiteTa’s file directory.
  • Attacker uses special inputs circumvent the directory.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptographic Attacks

A
  • Takes advantage of the user’s trust in the results without valid reasons.
  • Algorithmic weakness can be exploited or overlooked by developers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly