Recognizing Application Attacks Flashcards
Dump the SAM
Privilege Escalation attack that gets the Security Accounts Manager on Windows
Retrieve /etc/password file
Privilege Escalation attack on a Linux machine
Look for insecure file shares
Privilege Escalation attack
DLL preloading
Privilege Escalation attack that replaces good dll’s with hacked versions.
Insecure or weak security processes
Privilege Escalation attack
Non-persistant XSS
Crafted URL for email blog posts
DOM based XSS
Used to hijack sessions
Persistant XSS
Server based that can execute on users PC by visiting infected site.
SQL Injection Attack
Modifying the query to get additional information not allowed.
DLL Injection
Inserting code into a running process and attach memory and then run.
LDAP Injection
Modified query to get LDAP to bring back different information than intended.
LDAP
Lightweight Directory Access Protocol that checks for user and group permissions in AD.
XML Injection
Manipulates XML file to perform different logic.
Pointer Dereference
Cause an application to throw an error an crash. (DOS attack or Remote Code execution.)
Directory Traversal/Command Injection
Manipulates user input to gain access to files not intended to be visible.