Chapter 3 Application Attack Indicators Flashcards
1
Q
Denial-of-Service Attack
A
- Denies authorized users access either to specific information or to the computer system or network itself.
- Denies the use of or access to a specific service or system.
2
Q
Bluejacking
A
- Used for sending of unauthorized messages to another Bluetooth device.
3
Q
Man in the Middle Attack
A
A mechanism whereby an attacker can inject himself into the middle of a conversation between two devices.
4
Q
Refactoring
A
- The process of restructuring existing computer code without changing its external behavior.
- A means by which an attacker can add functionality to a driver yet maintain its desired functionality.
5
Q
Shimming
A
- A process of putting a layer code between the driver and the OS.
- Allows flexibility and portability by enabling changes between different versions of an OS without modifying the original driver code.
6
Q
Pass the Hash
A
- The attacker captures the hash used to authenticate a process.
- The attacker does not need to know the password.
7
Q
Resource Exhaustion
A
- The state where a system does not have all of the resources it needs to continue to function.
- The aim attack;s aim is to deplete resources.
8
Q
Improper Error Handling
A
- Attackers can use the information they gather from errors to further their attack.
8
Q
Memory Leak
A
- Errors in memory management.
- Memory issues can go over time which consume more and more resources.
8
Q
Integer Overflow
A
- A programming error condition that occurs when a program attempts to store a numeric value.
9
Q
DLL Injection
A
An attack that uses the injection of a DLL onto a system, altering the processing of a program by in essence recoding it.
9
Q
Race Condition
A
An error condition that occurs when the output of a function is dependent on the sequence or timing of the inputs.
10
Q
Privilege Escalation
A
When the attacker exploits vulnerabilities to achieve root- or admin-level access.
11
Q
Injection Attacks
A
- When input is used in a fashion that allows command-line manipulation.
- Gives that attacker command-line access at the privilege level of the application.
12
Q
Structured Query Language (SQL)
A
- A form of code injection aimed at any SQL-based database, regardless of vendor.