Chapter 1.3 - Application Attacks Flashcards
Given the scenario, analyze potential indicators associated with application attacks
Privilege Escalation
Gaining higher-level access to a system
More capabilities
Cross-Site Scripting (XSS)
Type of injection, in which malicious scripts are injected into otherwise benign and trusted websites
Non-persistent (Reflected) Cross-Site Scripting Attack
The injected malicious script is “reflected” off the web server as a response that includes some or all of the input sent to the server as part of the request
Persistent (Stored) Cross-Site Scripting Attack
Posting a message to a social network that includes a malicious payload
Posted and propagated to others
Code Injection
Adding your own information into a data stream
Structured Query Language (SQL) Injection
Inserting an SQL query into regular input or form fields in order to get credentials such as a username or password
Extensible Markup Language (XML) Injection
Modify requests and sending data and storing it in a different location
Lightweight Directory Access Protocol (LDAP) Injection
Modify requests and gaining directory information you normally would not have access to
Dynamic-Link Library Injection
Inject a DLL into an application and have that application run the code for us
Buffer Overflows
Overwriting a buffer memory and have it spill over into other memory areas
Replay Attacks
Data transfer is maliciously repeated or delayed
NOT an On-path attack
Cross-Site Request Forgery
Malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts
Pointer/ Object Dereference
Programming technique that references a portion of memory
Directory Traversal/ Path Traversal
Reading files from a web server that are outside the website’s file directory
Race Conditions
Two commands happening at the same time without being planned for