Pretest 2 Flashcards
What is Cross-Site Scripting (XSS)?
A vulnerability where an attacker injects malicious scripts into webpages viewed by other users. The script runs in the context of the victim’s browser, allowing attackers to steal information, impersonate users, or manipulate webpage content.
What is SQL Injection?
SQL Injection is a code injection technique where malicious SQL statements are inserted into an input field (such as a search or login form) to manipulate a database. It allows attackers to retrieve, modify, or delete data from a database, potentially leading to unauthorized access.
What is Cross-Site Request Forgery (CSRF)?
CSRF is an attack where a user is tricked into performing an action on a website without their consent, often by clicking a link or visiting a malicious website. If the user is authenticated, CSRF can make unauthorized requests on their behalf, such as changing account settings or transferring funds.
What is Command Injection?
Command Injection occurs when an attacker inserts malicious commands into a web application’s input fields, which are then executed by the server’s operating system. This can lead to unauthorized access, data manipulation, or execution of arbitrary commands.
What is a Man-in-the-Middle (MITM) Attack?
A Man-in-the-Middle (MITM) attack occurs when an attacker intercepts communication between two parties (e.g., a user and a website) and may modify, steal, or inject malicious data into the communication without either party knowing.
What is Directory Traversal?
Directory Traversal (or Path Traversal) is an attack where an attacker manipulates input in a URL to access files or directories that are outside of the intended directory. This can allow access to sensitive files on the server.
What is Clickjacking?
Clickjacking is a technique where a malicious actor tricks a user into clicking something different from what the user perceives, essentially hijacking their click. This can cause users to perform unintended actions, such as changing settings or initiating transactions.
What is Session Fixation?
Session Fixation is a type of attack where an attacker sets a user’s session ID before the user logs in. If the user then logs in with that session ID, the attacker can hijack the session and impersonate the user.
What is a Denial-of-Service (DoS) Attack?
A Denial-of-Service (DoS) attack aims to make a system or service unavailable to its intended users by overwhelming it with a flood of traffic or exploiting weaknesses in the system.
What is Distributed Denial-of-Service (DDoS)?
A Distributed Denial-of-Service (DDoS) attack is a type of DoS attack where the attack traffic is generated from multiple sources, usually a network of compromised machines (a botnet). This makes it harder to mitigate compared to a DoS attack from a single source.
What is Privilege Escalation?
Privilege Escalation occurs when a user or process gains higher privileges than originally assigned. This can allow attackers to gain unauthorized access to restricted systems or data.
What is Password Cracking?
Password Cracking refers to the process of attempting to recover passwords from stored or transmitted data by using various techniques like brute force, dictionary attacks, or exploiting weak hashing algorithms.
What is Subdomain Takeover?
Subdomain Takeover happens when an attacker takes control of a subdomain that was previously registered but is no longer in use (for example, due to misconfiguration or deletion of the associated service). The attacker can then host malicious content on the subdomain.
What is Cross-Site Script Inclusion (XSSI)?
Cross-Site Script Inclusion (XSSI) occurs when a web application allows a malicious script to include a sensitive JSON or JavaScript file from a different domain. This can lead to data leakage or unauthorized access to APIs.
What is Remote File Inclusion (RFI)?
Remote File Inclusion (RFI) is a vulnerability where an attacker can include files from remote servers in an application, leading to arbitrary code execution or data exposure. This typically occurs due to improper validation of file input in the application.