Comp Security- Week 7 Flashcards
Typical properties of spoof sites:
Show logos from honest site
Suspicious urls
Ask for user input
html copied from honest site (f12)
short lived
What makes a site trusted?
Certificate of authority that is recognized by the browser in the uae it’s CERT
What is SQL injection? What do hackers use it for?
The process of adding SQL statements in user input
Used by hackers to:
Probe databases
Bypass authorization
Execute multiple sql statements
Call built in stored procedures
When does sql injection occur?
When developers dynamically build sql statements by using user input which then lets hacker add their own commands via user input
Why is drop more harmful than delete
drop; drops an entire table
delete; deletes a record
what does ‘ or 1=1 – do
1=1 make statement true
– cause rest of line to be ignored
How do attackers know?
Insider info
Trial and error
How to prevent?
Data validation strategies and all methods must check data type, syntax, length