Programming Vulnerabilities Flashcards

1
Q

Buffer Overflows

A

When an attack goes past the boundary of the destination buffer and corrupts adjacent memory

Heap and Stack are buffer overflows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stack Overflow

A

Buffer overlow that has a fixed size withtin program memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Heap Overflow

A

Dynamic memory is overflowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integer Overflow

A

increments an integer variable beyond max value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSRF

A

attack based on behalf of authenticated user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Broken Access Control

A

manipulating URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Reflected XSS

A

steal users session token and gets reflected off a web app and then executed locally on browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Persistent XSS

A

Malicious script is permanently stored on web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LFI vs RFI

A

LFI allows access to local files on the server hosting the webapp bad input validation or insecure coding practices

RFI is code injection from a remote server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Using Strings what tool can you use see obfuscated output

A

Base64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly