Module 4 - Reading Flashcards

1
Q

vBulletin Hole

A

Failure to remove /install and /core/install allows ability to add administrator accounts

35,000 sites hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Oracle Web Hacking - reasons

A
  • complicated
  • lots of default content
  • users have to pay for patches and adivsory info
  • complicated patch/upgrade process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Joomla and Wordpress

A
  • attempts to login to administrator pages /administrator/index.php and /wp-login.php
  • 17000 domains in day (single computer), 100000 a week
  • Stealrat (spam)
  • Blackhole Exploit kit (redirect)

mitigations:

  • software up to date
  • strong passwords
  • settings and plug-ins to help secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Content Management Sites (Fort Disco)

A

Windows based bonnet, attacks PHP-based blog and CMS website
> targets weak passwords (most admin and 123456)
>over 25,000 bots
> 6000 sites affected

  • reasons:
  • by uploading PHP shell, issue commands to thousands of sites in seconds
  • hosted in data centers with large bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Apache targets

A
  1. appending malware to outgoing data via config files

2. disabling root changes on infected files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQL Injection

A

dnf666

  • account credentials for online gaming sites
  • javasploit exploit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CMS vulnerabilities

A
  • 20% of top 10,000 websites rely on CMS
  • 7 of top 10 e-commerce plugins and 20% of top plugins vulnerable to attack
  • 20% of vulns in 3rd party code, 80% in plugins and extensions

Top 10 vulns

  • Injection
  • Broken authentication
  • XSS
  • insecure direct object references
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wed Ontology Language

A

OWL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OWASP

A

Open Web Application Security Project

  • 4 out of top 10 vulnerabilities related to input validation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Detecting

A
  • Anomaly based IDS
  • Signature based IDS
  • Data Mining Techniques or statistical IDS
  • ontology based ids
How well did you know this?
1
Not at all
2
3
4
5
Perfectly