Chapter 3 Application Attack Indicators Flashcards

1
Q

Denial-of-Service Attack

A
  • Denies authorized users access either to specific information or to the computer system or network itself.
  • Denies the use of or access to a specific service or system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluejacking

A
  • Used for sending of unauthorized messages to another Bluetooth device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Man in the Middle Attack

A

A mechanism whereby an attacker can inject himself into the middle of a conversation between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refactoring

A
  • The process of restructuring existing computer code without changing its external behavior.
  • A means by which an attacker can add functionality to a driver yet maintain its desired functionality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shimming

A
  • A process of putting a layer code between the driver and the OS.
  • Allows flexibility and portability by enabling changes between different versions of an OS without modifying the original driver code.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pass the Hash

A
  • The attacker captures the hash used to authenticate a process.
  • The attacker does not need to know the password.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Resource Exhaustion

A
  • The state where a system does not have all of the resources it needs to continue to function.
  • The aim attack;s aim is to deplete resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Improper Error Handling

A
  • Attackers can use the information they gather from errors to further their attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Memory Leak

A
  • Errors in memory management.
  • Memory issues can go over time which consume more and more resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integer Overflow

A
  • A programming error condition that occurs when a program attempts to store a numeric value.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DLL Injection

A

An attack that uses the injection of a DLL onto a system, altering the processing of a program by in essence recoding it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Race Condition

A

An error condition that occurs when the output of a function is dependent on the sequence or timing of the inputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privilege Escalation

A

When the attacker exploits vulnerabilities to achieve root- or admin-level access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Injection Attacks

A
  • When input is used in a fashion that allows command-line manipulation.
  • Gives that attacker command-line access at the privilege level of the application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Structured Query Language (SQL)

A
  • A form of code injection aimed at any SQL-based database, regardless of vendor.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dynamic-Link Library (DLL)

A
  • A piece of code that can add functionality to a program though the inclusion of library routines linked at runtime.
14
Q

Lightweight Directory Access Protocol (LDAP)

A
  • An injection-based attack.
  • When an application constructs an LDAP request based on user input, failure to validate the input can lead to a bad LDAP request.
15
Q

Extensible Markup Language (XML)

A

XML that is maliciously altered can affect changes in configurations, changes in the data streams, changes in outputs.