Application Attacks Flashcards
1
Q
Buffer Overflow
A
developer does not validate user input to ensure appropriate size (allow too large input)
2
Q
During which stage is a Back Door often used?
A
Development + Debugging
3
Q
Characteristics of Back Door
A
undocumented command sequences, allow individuals with back door knowledge to bypass normal restrictions
4
Q
Time of Check to Time of Use (TOC/TOU)
A
timing vulnerability = program checks access permission too far in advance of request
5
Q
Rootkit
A
freely available on the internet, exploits known vulnerabilities, allows escalation of privilege