Chapter 3 Application Attack Indicators Flashcards
What is Privilege escalation?
Exploits that allow an attacker to achieve higher levels of authority
What is Cross-site scripting (XSS)?
Injecting malicious code into a web app where it can be executed
What is a Non-persistent XSS attack?
The injected script is not persisted or stored but rather is immediately executed and passed back via the web server
What is a Persistent XSS attack?
The script is permanently stored on the web server or some backend storage. This allows the script to be used against others who log in to the system
What is a DOM-based XSS attack?
The script is executed in the browser via the Document Object Model (DOM) process as opposed to the web server
What is input validation?
Also know as data validation, is the structured and proper testing of any input that is supplied by an application or user
What is a Structured Query Language (SQL) injection attacks
The manipulation of input, resulting in a SQL statement that is different from the statement the designer intended
What is a Dynamic Link Library (DLL)?
a piece of code that can add functionality to a program through the inclusion of library routines linked at runtime
What is DLL injection?
The process of adding to a program at runtime
What is a pointer?
A construct that refers to the memory location that holds the variable
What is a Directory Traversal attack?
When an attacker uses special inputs to circumvent the directory tree structure of the filesystem
What is a Buffer Overflow?
An attack that sends a tone of values to the buffer causing it to overwrite was in the buffer, which can either cause an error or for any command sent as input to execute
What is a race condition?
An error condition that occurs when the output of a function is dependent on the sequence or timing of the inputs
What is a time of check/time of use attack?
An attack that takes advantage of a separation between the time a program checks a value and when it uses the value, allowing an unauthorized manipulation that can affect the outcome of a process
What kind of attacks does input validation work well against?
buffer overflows, XSS, XSRF, path traversal, and incorrect calculation of buffer size