Domain 7: Systems and App Security Flashcards
Pointer overflow attack
Similar to buffer overflow. Attackers uses Buffer OF techniques to change it to point to malicious code.
Directory transversal
Web attack to jump to higher level directories on web server.
Covert Channel
Any non-standard means of communication
SQL Escape Characters
Attacker uses as part of an attack script in web form field.
File infecting virus
Attacks executables
Stealth virus
Masks itself as another type of program to avoid detection
Retrovirus
Attacks AV
Multipartite virus
Attacks different parts of the host such as boot sector, exe’s, and apps.
File extension attack
Using a long file name to hide a double extension
Pharming
Social engineering attack. Attack on hosts file or DNS server
Rogue SW
Trojan that works like ransomware
Retina
Vuln scanning SW like Nessus
System-key utility
Defense against windows based password cracking.
Centralized Application management (CAM)
Virtual Desktops, SaaS
COPE
Corporate Owned Personally Enabled