Chapter 3 Flashcards
Acronym for API
Application Programming Interface
DLL
Dynamic Link Library
DOM
Document Object Model
LDAP
Lightweight Directory Access Protocol
RPC
Remote Procedure Call
SAM
Windows Security Account Manager
SQL
Structured Query Language
SSL
Secure Socket Layer
TLS
Transport Layer Security
TOC/TOU
Time of Check / Time of Use
XML
Extensible Markup Language
XSRF
Cross Site Request Forgery
XSS
Cross Site Scripting
Most Cyber attacks begin at a ___ level associated with an ordinary user
Ordinary User
Problem with weak validation?
1 cause behind most overflows, injection attacks and canonical structure errors
Resource Exhaustion?
A state where a system doesn’t have the resources it needs to continue to function.
Why did Microsoft reduce the number of processes and services that run in elevated mode in its operating systems?
Blocking privilege escalation is an important defensive step in a system.
What is a memory leak?
When a program doesn’t dump it’s unused memory
Another name for input validation?
Input Handling
What are stored procedures?
Functions or SQL shortcuts or macros
Three methods an attacker can use to achieve privilege escalation?
- Use existing privileges to steal a better set of credentials 2. Exploiting vulnerabilities or weaknesses in processes that are running with escalated privileges. 3.
SQL Injection attack?
Changing the where statement to ‘ or 1=1 -
Persistent XSS attack?
Where XSS script is stored on the server
Non Persistent XSS attack
Script is not stored on server but is injected and passed to the server
DOM Based XSS attack
XSS script is executed in the browser as opposed to the server
Pass the Hash attack?
Attacker grabs the hash used to authenticate and then passes or injects the hash in place of a password.
What three languages make up the DOM
What is TOC/TOU attack?
A time of check time of use attack is one that takes advantage of a separation between the time a program checks a value and when it uses a value.
What is meant by the use of single or double quotes in SQL?
Double quotes are used to indicate identifiers within the database, which are objects like tables, column names, and roles. In contrast, single quotes are used to indicate string literals.
What is a pointer?
A construct that refers to the memory location that holds the variable as opposed to a variable.
What is pointer dereferencing?
What is a race condition?
How is a directory traversal performed?
What is SSL stripping?
What is shimming?
What is refactoring?
What is a memory leak?
What is a buffer overflow?
What is an integer overflow?
What is a server-side request forgery?
What is driver manipulation?
Why do modern Microsoft operating systems perform driver signing?
Provide an example of XSRF?
What is an API attack?
How does a replay attack occur?
What is a DLL?
What is a DLL injection?
What is XML?
What is an XML attack?