Application Attacks Flashcards
1.3
Vulnerability allows a normal user to gain extended capabilities on a system.
Privilege escalation
One of the most common web app development errors. Malware that uses JS.
Cross-site scripting
One user can get access to resources that would only be available to another user of the same level.
Horizontal Privilege escalation
Type of cross-site scripting attack that allows someone to run scripts within the user input of the webpage. Sends credentials/session IDs/ cookies to the attacker. Script embedded in the URL and executes in the victim’s browser. Specific target.
Reflected (Non-persistent) XSS Attacks
Attacker posts a message to a social network, includes a malicious payload, and everyone gets the payload. This is not a specific target.
Stored (persistent) XSS attack
In this type of attack, the attacker puts their own code into an existing data stream.
Injection Attack
Type of injection attack, commonly used to store info about authentication or devices and users.
Lightweight Directory Access Protocol
LDAP injection
Injection of code into an application to have the application execute the code for us. Runs as part of the target process.
DLL Injection (Dynamic Link Library
Attack that occurs when one section of memory is able to overwrite a different section of memory. A good type of this is one they can replicate and control.
Buffer Overflow Attack
When a cybercriminal eavesdrops on a secure network communication, intercepts it, and then fraudulently delays or resends it to misdirect the receiver into doing what the hacker wants.
Replay attack
Technique where an attacker captures a password hash and then passes it through authentication and lateral access to other networked systems.
Pass the Hash (PtH)
Malicious act of taking control of a user’s web session.
Session hijacking (Sidejacking)
The insertion of malicious data, which has not been validated, into a HTTP response header.
Header Manipulation
One-click attack - session riding (sea surf). Takes advantage of the trust that a web application has for the user.Example, sending a link to the server with the URL parameters of a user’s login.
Cross-site request forgery
Attacker finds a web app vulnerability, it sends request to a web server and the server performs the request on behalf of the attacker.
Server-side request forgery