Chapter 4 - The web - user side Flashcards
man-in-the-browser
Code inserted into the browser can read, copy, and redistribute anything the user enters in a browser.
keystroke logger (or key logger)
either hardware or software that records all keystrokes
entered.
Page-in-the-middle attack
type of browser attack in which a user is redirected
to another page.
download substitution
the attacker presents a page with a desirable and seemingly innocuous program for the user to download, What the user does not know is that instead
of or in addition to the intended program, the attacker downloads and installs malicious code.
CAPTCHA
an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart
puzzle that supposedly only a human can solve, so a server application can distinguish between a human who makes a request and an automated program
generating the same request repeatedly.
phishing
an unsuspecting user submits sensitive information
to a malicious system impersonating a trustworthy one.
one-time password
only one use. the two end parties need to have a shared secret list of passwords.
Out-of-band communication
transferring one fact along a communication path
separate from that of another fact.
website defacement
occurs when an attacker replaces or modifies
the content of a legitimate web site.
signed code
Users can hold downloaded code until they inspect the seal. After verifying that the seal is authentic and covers the entire code file being downloaded, users can install the code obtained.
web bug, also called a clear GIF, 1x1 GIF, or tracking bug
a tiny image, as small as 1 pixel by 1 pixel (depending on resolution, screens display at least 100 to 200 pixels per inch), an image so small it will not normally be seen. Nevertheless, it is loaded and processed the same as a larger picture. Part of the processing is to
notify the owner, the advertiser, who thus learns that another user has loaded the advertising image.
Clickjacking
a technique that essentially causes that prompt box to slide around so that [Yes] is always under the mouse. The attacker also makes this box transparent, so
the victim is unaware of clicking anything.
framing, or using an iframe
a structure that can contain all or part of a page, can be placed and moved anywhere on another page, and can be layered on top of or underneath other frames.
drive-by download
an attack in which code is downloaded, installed, and executed on a computer without the user’s permission and usually without the user’s knowledge.
cross-site scripting
executable code is included in the interaction between client and server and executed by the client or server.