Application Attacks Flashcards

1.3

1
Q

Vulnerability allows a normal user to gain extended capabilities on a system.

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One of the most common web app development errors. Malware that uses JS.

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

One user can get access to resources that would only be available to another user of the same level.

A

Horizontal Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of cross-site scripting attack that allows someone to run scripts within the user input of the webpage. Sends credentials/session IDs/ cookies to the attacker. Script embedded in the URL and executes in the victim’s browser. Specific target.

A

Reflected (Non-persistent) XSS Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker posts a message to a social network, includes a malicious payload, and everyone gets the payload. This is not a specific target.

A

Stored (persistent) XSS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In this type of attack, the attacker puts their own code into an existing data stream.

A

Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of injection attack, commonly used to store info about authentication or devices and users.
Lightweight Directory Access Protocol

A

LDAP injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Injection of code into an application to have the application execute the code for us. Runs as part of the target process.

A

DLL Injection (Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack that occurs when one section of memory is able to overwrite a different section of memory. A good type of this is one they can replicate and control.

A

Buffer Overflow Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When a cybercriminal eavesdrops on a secure network communication, intercepts it, and then fraudulently delays or resends it to misdirect the receiver into doing what the hacker wants.

A

Replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technique where an attacker captures a password hash and then passes it through authentication and lateral access to other networked systems.

A

Pass the Hash (PtH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious act of taking control of a user’s web session.

A

Session hijacking (Sidejacking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The insertion of malicious data, which has not been validated, into a HTTP response header.

A

Header Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One-click attack - session riding (sea surf). Takes advantage of the trust that a web application has for the user.Example, sending a link to the server with the URL parameters of a user’s login.

A

Cross-site request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacker finds a web app vulnerability, it sends request to a web server and the server performs the request on behalf of the attacker.

A

Server-side request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack that exploits a previously unknown hardware firmware, or software vulnerability. It has no signature.

A

Zero Day Attack

17
Q

Device drivers allow an OS to talk to hardware devices. Attackers may dive deep into device drivers and manipulate them so that they undermine the security on your computer.

A

Driver manipulation

18
Q

Filling the space between two objects. A middleman.

A

Shimming

19
Q

Also reference as Metamorphic malware. Every time it downloads is a unique version of the malware. So it won’t match any signature in your anti-virus.

A

Refactoring

20
Q

Combination of a on-path attack with a downgrade attack. Hard to execute but big winnings. Victim does not see anything unusual. The browser page communicates via HTTP instead of HTTPS.

A

SSL Stripping / HTTP downgrade