Classes Flashcards

Go over common classes

1
Q

Name 13 Bug Classes

A
Authentication Bypass
CSRF
Denial of Service
File Handling
IDOR
Information Disclosure
Injection Attacks
Java Deserialization Checks
Memory Corruption
RCE
Resource Exhaustion
SSRF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does an authentication bypass vulnerability exist in an application?

A

An authentication bypass vulnerability exists in an application if there is a way to authenticate to the application without providing all of the authentication credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of an authentication bypass vulnerability?

A
  • The app compares a simple check sum of the password which is easy to brute force
  • SQL injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CSRF Stand for?

A

Cross Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do CSRF attacks work?

A

They work by tricking signed-in users into making requests unknowingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give a general example of a CSRF attack with zoom.us

A

Attacker has a form on their website that appears to be for some other person; a user of our website is logged in to zoom.us and fills out the form on the attacker’s website. When they submit the form, unbeknownst to them, the browser makes a POST request to our site which changes the state of their account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain denial of service

A

A vulnerability exists that, when exploited, causes an application to crash or become unresponsive

An attacker can then use that to deny legitimate users access to the application and the service it provides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name and explain the two types of denial of service

A
  • Persistent - permanently prevents legitimate users from accessing the service (some stored state is corrupted / application crashes when restarted)
  • Non-persistent - lasts only as long as the attacker is sending data to cause the denial-of-service condition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does IDOR stand for?

A

Insecure direct object reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are insecure direct object references?

A

They are a type of access control vulnerability that arises when an application uses user-supported input to access objects directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly