Application Attacks Flashcards

1
Q

Buffer Overflow

A

developer does not validate user input to ensure appropriate size (allow too large input)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During which stage is a Back Door often used?

A

Development + Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Characteristics of Back Door

A

undocumented command sequences, allow individuals with back door knowledge to bypass normal restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Time of Check to Time of Use (TOC/TOU)

A

timing vulnerability = program checks access permission too far in advance of request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkit

A

freely available on the internet, exploits known vulnerabilities, allows escalation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly