application attacks Flashcards
Privilege escalation
a cybersecurity technique that allows an attacker to gain more access or permissions to a system than they originally had
Cross-site scripting
an attack in which an attacker injects malicious executable scripts into the code of a trusted application or website
Injections
Injection attacks occur when attackers exploit vulnerabilities in an application to send malicious code into a system
This type of exploit may allow them to execute unauthorized commands, access data, or manipulate the system’s operation
access protocol (LDAP)
a vendor-neutral protocol that allows users to access and search for information within a network.
t’s a directory service protocol that runs on top of the TCP/IP stack and is based on a client-server model. L
Structured query language (SQL)
a programming language for storing and processing information in a relational database.
Dynamic link library (DLL)
a file type containing code, data, and resources that can be shared among multiple programs to accomplish specific tasks.
Lightweight directory
a software protocol that can be used to securely access information and resources on a network
Extensible markup language (XML)
a standard markup language that allows users to define their own data formats and encode data
Pointer/object dereference
If an attacker can make an application point to a null section of memory where nothing exists rather than the part of memory where the application data might exist,
Directory traversal
a common and dangerous way for hackers to gain access to restricted files on a website or web application
Attackers manipulate variables that reference files using dot-dot-slash (../) sequences to navigate outside of the intended directory and access sensitive files
Buffer overflows
typically involves violating programming languages and overwriting the bounds of the buffers they exist on. Most buffer overflows are caused by the combination of manipulating memory and mistaken assumptions around the composition or size of data.
Time of check/time of use
a type of software bug or security vulnerability that occurs when a system checks the state of a part of itself before using the results of that check
Race conditions
occurs when attackers manipulate the timing or sequence of events in a multithreaded or asynchronous system to compromise security
Error handling
a programming technique that helps developers manage unexpected situations in a program’s execution
It’s a critical part of an application’s security, as improper error handling can lead to security vulnerabilities
Improper input handling
refers to the inadequate or incorrect validation, sanitization, filtering, or encoding and/or decoding of input data
It’s a common weakness in applications and a leading cause of critical vulnerabilities in today’s systems