pentest+ Flashcards

1
Q

What is a race condition

A

occurs when the resulting outcome from execution processes is directly dependent on the order and timing of certain events, which then failed to execute intheorder and timing intended by the developer; happens where multiple threads attempt to write to a variable or object at the same memory location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dereferencing

A

occurs when the code attempts to remove the relationship between a pointer and the thing it points to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TOCTOU

A

occurs when there is a change between when an app checks a resource and when the app uses the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mutually Exclusive Flag (Mutex)

A

acts as a gatekeeper to a section of code so that only one thread can be processed at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

deadlock

A

occurs when a lock cannont be removed from the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

buffer overflow

A

when a process stores data outside the memory range allocated by the developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stack

A

reserved area of memory where the program saves the return address when a function call instruction is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

stack smashing

A

Stack smashing is a type of security vulnerability that occurs when an attacker is able to overwrite the contents of a program’s call stack; occurs when attacker fills up the buffer with NOP instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Non-Operation(NOP) instruction

A

tells the system to do nothing and simply go to the next instruction; a NOP instruction is an assembly language instruction that does not perform any operation and takes up one clock cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ASLR (address space layout randomization)

A

prevents an attacker’s ability to guess where the return pointer for a non-malicious program has been set to call back to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

data execution protection (DEP)

A

blocks applications that attempt to run from protected memory locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

integer overflow

A

occurs when a computed result from an operation is too large to fit into its assigned variable type for storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

insecure direct object reference

A

used to manipulate URLs to gain access to a resource without requiring proper authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP strict transport security (HSTS)

A

allows a web server to notify web browsers to only request using HTTPs and not HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTP public key pinning

A

allows https websites to resist impersonation by attackers using mis-issued or fraudulent certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

X-frame options

A

prevents clickjacking from occurring

17
Q

X-XSS-Protection

A

enables cross-site scripting filter in the web browser

18
Q

X-Content-Type-Options

A

prevents the browser from interpreting files as something other than what they are

19
Q

Content-Security-Policy (CSP)

A

impacts how web browsers render pages

20
Q

X-Permitted-Cross-Domain-Policies

A

sends a cross-domain policy file to the web client and specifies if the browser has permission to handle data across domains

21
Q

Referrer-Policy

A

governs which referrer information should be included with requests made

22
Q

Expect-CT

A

indicates browsers to evaluate connections to the host emitting the header for Certificate Transparency compliance

23
Q

Feature-Policy

A

allows developers to selectively enable and disable use of various browser features and APIs

24
Q

Representational State Transfer (REST)

A

a client/server model for interacting with content on remote systems over HTTP

25
Q

JavaScript Object Notation (JSON)

A

a text-based message format used with RESTful web service

26
Q

Simple Object Access Protocol (SOAP)

A

used for exchanging structural information for web services ; conduct inspection and sanitization of inputs and outputs to the application

27
Q

Asynchronous JavaScript and XML (AJAX)

A

a grouping of related technologies used on the client side to create asynchronous web applications; uses same-origin policy; considered more secure than some other methods

28
Q

Bytecode

A

an intermediate form of code produced by a complier that can be translated into machine code