Chapter 8 - Application Security Flashcards

1
Q

What can hackers gain by taking over application programs?

A

If an attacker can take over an application, they can execute commands with whatever privileges the application has. Most applications have root permissions, so this is… pretty bad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most popular way for hackers to take over hosts?

A

The most popular way for hackers to take over hosts is by taking over applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a buffer?

A

A buffer is an area of RAM where programs temporarily store data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a buffer overflow attack?

A

A buffer overflow attack is an attack that relies on forcing too much data into the buffer of a program. When the buffer “overflows”, it overflows into the “address” field of the buffer, which directs where control goes after the buffer entry is “popped off” the stack. This new overwritten address points back into the over-filled buffer, where code is waiting to be executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What impacts can a buffer overflow have?

A

A buffer overflow’s effects can range from absolutely nothing, to crashing a server, to running illicit code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is patching applications more time-consuming than patching operating systems?

A

Most firms will have a very small number of different operating systems to keep patched, verses a veritable “fleet” of applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why must you know a server’s role to know how to protect it?

A

Knowing a server’s role is vital to knowing how to protect it because you will be able to understand what applications and services can be removed or permissions reduced and still allow the server to fulfill its function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is it important to minimize both main applications and subsidiary applications?

A

It is important to minimize main and subsidiary applications because applications are the main source of vulnerability in machines today. Few applications means fewer possible avenues of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are security baselines needed for installing applications?

A

Security baselines are needed for installing applications because they will tell an installer what optional programs will be needed in an install, or what automatically-installed programs should be removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it important to minimize permissions for application programs?

A

It is important to minimize permissions for application programs for the same reasons that it is important to limit permissions for users; having unneeded extra access is a vulnerability if the program is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is application-level authentication superior to operating system authentication?

A

Application-level authentication is superior to OS authentication because, unlike OS authentication which gives broad access to the computer, application-level authentication can give a narrower field of permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should cryptographic protections be used between a user an applications?

A

Uh. Cryptographic protections should be used because they offer strong protection. Duh.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a login screen bypass attack?

A

A login screen bypass attack is when the attacker types a URL of a page beyond the login screen when the login screen appears.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a cross-site scripting (XSS) attack?

A

A cross-site scripting (XSS) attack is when an attacker sends a link to a user of a site that uses reflection prompting them to log in. This link has a script hidden at the end of it that reflects the user’s input to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an SQL Injection attack?

A

An SQL injection attack is when the attacker inputs an SQL command into a user input field in the form, which then is executed if the form is programmed poorly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What attitude should programmers have about user input?

A

User input is not to be trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What training should programmers who do custom programming have?

A

Programmers who do custom programming should get training in secure programming in general, focusing on their particular language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What risks do webservice and e-commerce service create for corporations?

A

Attacks on webservices and e-commerce services can disrupt service, harm a company’s reputation, and expose private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the difference between WWW service and e-commerce service?

A

WWW service encompasses basic things like webhosting, retrieving static and dynamic pages. E-commerce services are things like online catalogs, shopping carts, checkout systems, and the like.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What kinds of external access are needed for e-commerce?

A

E-commerce needs access to external sources, such as merchant banks, credit card number checking services, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Does the webmaster or e-commerce administrator have control over the security of other servers?

A

The webmaster/e-commerce administrator does not have control over the security of other servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why are custom programs especially vulnerable?

A

Custom programs are especially vulnerable because most firms do a poor job of ensuring the hardening of internally-developed applications. Most common programming languages have a tendency to produce common security failure modes that are pretty well-known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is website defacement? Why is it damaging?

A

Website defacement is exactly what it sounds, where an attacker vandalizes the website of its victim. It can be damaging because it can be made to look like actual, intentional changes by the victim, saying “out of business” or something like that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are directory transversal attacks?

A

Directory transversal attacks are attacks that use URLs to navigate to the root directory of the webserver in order to obtain system files, hashes, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Where is an application proxy firewall placed relative to the webserver?

A

With an application proxy firewall, it is placed between the webserver and the rest of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In staged development, what three servers do companies use?

A

In staged development, companies use the development, test, and production servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What permissions does the developer have on the development server? On the testing server? On the production server?

A

On the development server, developers have extensive permissions. On the test server, developers have no access permissions. On production, developers have no permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

On what servers do testers have access permissions?

A

Testers only have access permissions on test servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Why do hackers attack browsers?

A

Hackers attack browsers because they are generally far less secure than servers.

30
Q

What is mobile code? Why is it called mobile code?

A

Mobile code is code that is embedded in a webpage that is executed when “visited”. It is called mobile code because the code is moved from the webserver to the client.

31
Q

What is a client-side script?

A

A client-side script is a script that is executed on the client’s machine.

32
Q

What is a java applet?

A

A Java applet is a small web program embedded in a website.

33
Q

Why is Active-X dangerous?

A

Active-X is dangerous because it can do almost anything on the client machine, and does not have much in the way of security safeguards.

34
Q

Why is it bad to go to a malicious website?

A

Malicious websites are bad because they are often host to malicious mobile code, or will deliver attack scripts.

35
Q

Why is malware that allows an attacker to execute a single command on a user’s computer not really be limited to just a single command?

A

Because that command might just be “open a command prompt”.

36
Q

What may happen on a compromised computer if a user mistypes the host name in URL?

A

On a compromised computer, when the user mistypes a URL, they might be taken to an unwanted web-page, due to the DNS-handling routine having been Trojanized.

37
Q

What dangers do cookies create?

A

Cookies have the danger about them of storing sensitive information.

38
Q

Why are HTML bodies in e-mail messages dangerous?

A

HTML bodies in e-mail messages are dangerous because they allow for the execution of mobile code.

39
Q

What three problems does spam create?

A

Spam clogs up mailboxes, slows user computers, and requires users to spend time deleting the unwanted messages.

40
Q

Why is spam filtering dangerous?

A

Spam filtering is dangerous because it may filter out legitimate messages.

41
Q

For what reason should companies filter sexually or racially-harassing message content?

A

If they do not filter sexually or racially harassing content, companies may be held responsible.

42
Q

What is extrusion prevention?

A

Extrusion prevention is a form of filtering that looks for words such as “confidential” in an attempt to keep IP and other sensitive information from leaving a company through legitimate routes.

43
Q

What is PII, and why must it be prevented from leaving the firm?

A

PII, also known as personally identifiable information, is information that could be used to identify or impersonate a person. It must be prevented from leaving a firm, because loss of such information opens a firm up to lawsuits and the like.

44
Q

Is encryption widely used in email?

A

Encryption is not widely used in email.

45
Q

What part of the email process does SSL/TSL usually secure?

A

SSL/TSL generally encrypts transmission between an email client and its mail server. This is not

46
Q

What standards of email encryption provide end-to-end security?

A

S/MIME and PGP both use digital signatures, which allow for end-to-end security.

47
Q

What does RTP add to compensate for the limitations of UDP?

A

RTP, or the Real Time Protocol, adds two things to compensate for the lossy nature of UDP:

  • The RTP header has a sequence number that helps order packets that might arrive out of order.
  • The RTP header has a timestamp to figure out how to play sounds at just the right time.
48
Q

Distinguish between transport and signalling.

A

Transport is the actual exchange of voice data between two parties. Signaling is any communication that manages the network (triggering ringing, call disconnection, etc).

49
Q

What are the two main signaling standards in VoIP?

A

The two main signaling standards in VoIP are H.323 and SIP (Session Initiation Protocol).

50
Q

What does the registrar server do?

A

The registar server, after verifying credentials, adds the user’s location to its registration database, which is used by proxy servers to route calls.

51
Q

What type of SIP message does a VoIP phone use when it wants to connect to another VoIP phone? How is this message routed to the called VoIP phone?

A

A VoIP phone sends a SIP INVITE message to another VoIP phone in order to request a connection. It does this by first sending the INVITE to the sender’s SIP Proxy Server, which looks for another proxy server in the recipient’s network, which then receives the INVITE.

52
Q

Are SIP proxy servers involved during transport transmissions? Explain.

A

SIP proxy servers are not involved in transport transmissions. During transmission, the two VoIP phones communicate directly in transport mode, using RTP packets, unless the servers are needed for supervisory signalling.

53
Q

What two types of communication does the media gateway translate between the VoIP network and the PSTN?

A

The PSTN gateway is used for translation when calling between a switched phone and a VoIP phone.

54
Q

What is eavedropping?

A

Eavesdropping is the act of listening in to a phone call without permission.

55
Q

Why can DoS attacks against VoIP be successful even if they only increase latency slightly?

A

DoS attacks against VoIP can be successful even if they only increase latency slightly because it can make the call laggy and unintelligible.

56
Q

Why is caller impersonation especially dangerous on VoIP?

A

Caller impersonation on VoIP can allow an attacker to use caller ID to falsely display information, causing them to look more legitimate.

57
Q

Why are hacking and malware dangerous in VoIP?

A

Hacking and malware are dangerous to VoIP because once a device is “owned”, further attacks using the compromised device become almost effortless.

58
Q

What is toll fraud?

A

Toll fraud is what happens when an attacker uses a corporate VoIP system to place free long-distance and international phone calls. These exploits tend to be shared among groups of people, and can get expensive fast.

59
Q

What is SPIT? Why is it more disruptive than SPAM?

A

SPIT is the VoIP version of spam, in the form of phone calls, which are much harder to ignore.

60
Q

What authentication methods are common on IP telephones?

A

IP telephones use several forms of authentication, from usernames and passwords, PINs, or even using SPI Identity to sign SIP messages using private keys.

61
Q

What dose SIP Identity ensure?

A

SIP Identity ensures that messages that are being received from the second-level domain they claim to be coming from.

62
Q

How can eavesdropping on VoIP be thwarted?

A

Eavesdropping on VoIP can be thwarted with encryption, plain and simple.

63
Q

What sound quality problems may encryption create with VoIP?

A

Encryption on VoIP may cause a small delay, from 5 ms to 15 ms.

64
Q

Why do firewalls have problems with typical VoIP traffic?

A

Firewalls have trouble with traditional VoIP traffic because they have a hard time not adding latency, being forced to either use little or no filtering on transport packets, instead focusing on signalling packets.

65
Q

For SIP signalling, what port has to be opened on firewalls?

A

For SIP signalling, port 5060 must be opened on a firewall.

66
Q

Why is NAT transversal problematic?

A

NAT transversal is problematic because NAT tends to change destination IP addresses, which will then prevent VoIP from functioning properly.

67
Q

How are VLANs useful in VoIP?

A

VLANs can help VoIP by segregating VoIP to a separate VLAN than the servers and clients, reducing the risk of attack.

68
Q

In instant messaging, what does a presence server do?

A

Presence servers allow the two parties in an instant message conversation to locate one another, after which, peer-to-peer conversation takes over.

69
Q

What does a relay server do?

A

A relay server is what IM messages pass through, allowing IM firms to filter out illegal or inappropriate content.

70
Q

For corporate IM, what are the advantages of using a relay server instead of only a presence server?

A

A relay server allows for IMs to be monitored, logged, or filtered.