Recognizing Application Attacks Flashcards

1
Q

Dump the SAM

A

Privilege Escalation attack that gets the Security Accounts Manager on Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Retrieve /etc/password file

A

Privilege Escalation attack on a Linux machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Look for insecure file shares

A

Privilege Escalation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DLL preloading

A

Privilege Escalation attack that replaces good dll’s with hacked versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Insecure or weak security processes

A

Privilege Escalation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-persistant XSS

A

Crafted URL for email blog posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DOM based XSS

A

Used to hijack sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Persistant XSS

A

Server based that can execute on users PC by visiting infected site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SQL Injection Attack

A

Modifying the query to get additional information not allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DLL Injection

A

Inserting code into a running process and attach memory and then run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP Injection

A

Modified query to get LDAP to bring back different information than intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAP

A

Lightweight Directory Access Protocol that checks for user and group permissions in AD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XML Injection

A

Manipulates XML file to perform different logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pointer Dereference

A

Cause an application to throw an error an crash. (DOS attack or Remote Code execution.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directory Traversal/Command Injection

A

Manipulates user input to gain access to files not intended to be visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Buffer Overflow

A

Enough data to overflow memory allowing an attacker to input their code and elevate their privileges.

17
Q

Race Conditions

A

Being able to manipulate the order that actions are to be performed allowing them to get access or modify or disclose data.

18
Q

Time of Check

A

Part of race condition, where an attacker is able to gain access before the authentication check.

19
Q

TOCTTOU

A

Time of Check to Time of Use

20
Q

Replay Attack

A

Captures packets and puts them back on the wire. Can be stopped with digital timestamps aka sequencing.

21
Q

Integar Overflow

A

When the equation results in a higher than allowed amount and the integar starts to wrap around cause it can’t fit. Reverse money sent to money received etc.

22
Q

Cross Site Request Forgery (XSRF See-Surf)

A

Stealing a users active cookie.

23
Q

API

A

Application Programming Interface (API could be the gas petal that runs the car so you don’t need to know how the engine works but you just need to know the gas petal)

24
Q

XSS vs XSRF

A

XSS: Browser runs code because it came from a site it trusted.
XSRF: Server performs an action cause it was sent from a client it trusted.

25
Q

API Attack

A

Hostile attack (all methods) that are no longer protected by traditional security measures like WAF and port blocking.

26
Q

Resource Exhaustion

A

Attack that keeps going until all resources are used. DOS

27
Q

Memory Leak

A

Normally unintentional use of memory where the application doesn’t release back the memory. Used to crash the system and gain privileges.

28
Q

SSL

A

Secure Socket Layer

29
Q

SSL Stripping

A

Man in the middle attack that strips away SSL encryption and allows them to intercept traffic. (Wireshark)

30
Q

SSL Stripping Mitigations

A

Use SSL everywhere. Use HSTS which forces everyone to use HTTPS

31
Q

Shim Databases

A

Part of Windows Application Compatibility Infrastructure to allow legacy applications to run. Backward compatibility

32
Q

Shimming

A

Use the Shim databases to install bad stuff.

33
Q

Refactoring

A

Modifying source code without making functional changes. Good version is to make queries run faster.

34
Q

Pass the Hash

A

Harvesting user hash while they are accessing remote resources. Then using the hash for the password.