Mitigate Web Application Vulnerabilities and Attacks Flashcards

1
Q

An injection attack occurs when the attacker inserts malicious code through an
application interface

A

Directory Traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A web application vulnerability that allows an attacker either to download a file
from an arbitrary location on the host file system or to upload an executable or
script file to open a backdoor

A

File Inclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attacker executes a script to inject a remote file into the web app or website

A

Remote File Inclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacker adds a file to the web app or website that already exists on the
hosting server

A

Local File Inclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malicious script hosted on the attacker’s site or coded in a link injected onto a
trusted site designed to compromise clients browsing the trusted site,
circumventing the browser’s security model of trusted zones

A

Cross-Site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack that inserts code into a back-end database used by the trusted site

A

Persistent XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack that exploits the client’s web browser using client-side scripts to modify
the content and layout of a web page

A

Document Object Model (DOM) XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Structured Query Language (SQL) is used to select, insert, delete, or update data within a database

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Insertion of additional information or code through data input from a client to an
application

A

Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack consisting of the insertion or injection of an SQL query via input data from
the client to a web application

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

XML data submitted without encryption or input validation is vulnerable to spoofing,
request forgery, and injection of arbitrary code

A

XML Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XML encodes entities that expand to exponential sizes, consuming memory on
the host and potentially crashing it

A

XML Bomb (Billion Laughs Attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack that embeds a request for a local resource

A

XML External Entity (XXE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any technique used to ensure that the data entered into a field or variable in an
application is handled appropriately by that application

A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A string is stripped of illegal characters or substrings and converted to the
accepted character set

A

Normalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack method where input characters are encoded in such a way as to evade
vulnerable input validation measures

A

Canonicalization Attack

17
Q

Coding methods to sanitize output by converting untrusted input into a safe form
where the input is displayed as data to the user without executing as code in the
browser

A

Output Encoding

18
Q

A technique that defends against SQL injection and insecure object references by
incorporating placeholders in a SQL query

A

Parameterized Queries

19
Q

A software-based attack where the goal is to assume the identity of a user,
process, address, or other unique identifier

A

Spoofing

20
Q

An attack where the attacker sits between two communicating hosts and
transparently captures, monitors, and relays all communication between the
hosts

A

Man-in-the-Middle Attack

21
Q

Brute force attack in which multiple user accounts are tested with a dictionary of
common passwords

A

Password Spraying

22
Q

Brute force attack in which stolen user account names and passwords are tested
against multiple websites

A

Credential Stuffing

23
Q

A software vulnerability where the authentication mechanism allows an attacker
to gain entry
▪ Weak password credentials
▪ Weak password reset methods
▪ Credential exposure
▪ Session hijacking

A

Broken Authentication

24
Q

Session management is a fundamental security component in web applications

A

Session Management

25
Q

Text file used to store information about a user when they visit a website

A

Cookie

26
Q

Cookies that are stored in the browser cache until they are deleted by the user or
pass a defined expiration date

A

Persistent Cookie

27
Q

A type of spoofing attack where the attacker disconnects a host then replaces it
with his or her own machine, spoofing the original host’s IP address

A

Session Hijacking

28
Q

A type of spoofing attack where the attacker attempts to predict the session
token to hijack a session

A

Session Prediction Attacks

29
Q

A malicious script hosted on the attacker’s site that can exploit a session started
on another site in the same browser

A

Cross-Site Request Forgery (XSRF/CSRF)

30
Q

Modifies the contents of a cookie after it has been generated and sent by the web
service to the client’s browser so that the newly modified cookie can be used to
exploit vulnerabilities in the web app

A

Cookie Poisoning

31
Q

A software vulnerability where an attacker is able to circumvent access controls and
retrieve confidential or sensitive data from the file system or database

A

Sensitive Data Exposure

32
Q

A type of hijacking attack that forces a user to unintentionally click a link that is embedded in or
hidden by other web page elements

A

Clickjacking