Lec 11: Web Security II: XSS, CSRF Flashcards

1
Q

What are websites? How are they implemented?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What browser attacks are a result of unforeseen user input?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where are the majority of vulnerabilities now found in software?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is web attacker? How does it work and what is the goal?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is gadget attacker?

A

Variation of web attacker.

Like adding an evil map extension to your website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the basic execution model of the browser?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the events in the basic execution model of the browser?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the browser’s relationsip with HTML and Scripts?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Event-Driven Script Execution?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is JavaScript? What is it used for? How do attackers use it?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the history behind JavaScript?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is JavaScript used in web pages?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the JavaScript Security Model?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the same-origin policy?

A

Part of the JavaScript Security Model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do library imports relate to the JavaScript security model?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the DOM?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does browser and document structure look like?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are reading properties with JavaScript?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some page manupulation possibilities with JavaScript?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How can you use JavaScript to steal the clipboard contents?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are frames? Why do you use them?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is remote scripting? What are the methods you can achieve it?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does remote scripting work>

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is port scanning behind firewall?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Cross Site Scripting? How does it work?

A
26
Q

What are cookies?

A
27
Q

What is the basic pattern of cross site scripting?

A
28
Q

What is the echoing User Input example?

A

A XSS example (cross site scripting)

29
Q

How does Cross-Site Scripting to steal cookies work?

A
30
Q

Why would a user click on an evil link that would allow for XSS?

A
31
Q

Why does it matter if an attacker gets a cookie for naive.com in XSS?

A
32
Q

How does a stored script XSS attack work?

A
  1. The attacker can register an account inputing the XSS into a field.
  2. attacker sends register account request form
  3. adminstrator opens request form with the XSS in it, then the adminstrator’s cookie is stolen
  4. attacker can now use adminstrators cookie to get adminstrative control
33
Q

How does a stored script XSS attack work from attackers POV?

A
34
Q

How does stored script XSS work from victim administrator POV?

A
35
Q

(T/F) XSS is a form of “reflection attack”. Explain what a reflectiona ttack is

A
36
Q

What damage can XSS cause to the victim?

A
37
Q

Where do malicious scripts lurk?

A
38
Q

What are other sources of malicious scripts?

A
39
Q

What was the MySpace Worm?

A
40
Q

What was the Twitter Worm?

A
41
Q

How do you prevent XSS?

A
42
Q

What is validateRequest in ASP.NET? What is its flaw?

A
43
Q

What is httpOnly Cookies?

A
44
Q

What is the problem related to cross site request foregery?

A
45
Q

What is Cross-Site Request Foregery?

A
46
Q

What is the basic idea of XSRF?

A
47
Q

Why is cooke authentication not enough?

A

Can use JavaScript to send a request to have a bad thing at the naive site happen using cookie for authentication

48
Q

How does XSRF work in code/HTTP?

A
49
Q

How does login XSRF work in HTTP diagram?

A
50
Q

How do you use XSRF for XSS with inline gadgets?

A
51
Q

What is the difference between XSRF and XSS?

A
52
Q

What are XSRF defences?

A
53
Q

What is the secret, random validation token defense to XSRF work?

A
54
Q

What is NoForge?

A
  • need to bind session ID to token in order to do a secret, random validation token protection against XSRF
55
Q

What are the differentt ypes of referer validation for XSRF protection?

A
56
Q

Why is referer validation not always strict?

A
57
Q

What is an XSRF attack with lenient referer checking?

A
58
Q

What is the ideal XSRF defense?

A
59
Q

What is an origin header?

A
60
Q

What are the differences between the three standard web attacks: SQL injection, XSS, and XSRF?

A