SECOPS 6: Common Attack Vectors Flashcards

1
Q

Goal of Obfuscating javascript code

A

Protect IP of developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

eval()

A

Sign of JavaScript obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DOM

A

HTML Model for accessing web-based documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

jsunpack or jsdetox

A

Model to decode obfuscated javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

JavaScript key variable

A

Always the first part of a string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

‘+”"”)())();’

A

JavaScript string always ends with this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DEP

A

Prevents the use of stack memory space for execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DEP circumvented by…

A

heap memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ASLR bypassed by…

A

egg hunting (executing code stub that ID’s memory location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shellcode stage payload

A

Buffer overflow to acquire memory space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unstaged payload

A

No space limitations. Payload resides with a single memory space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Way to detect shellcode on the network

A

Detect a sequence of NOP instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NOP Sled

A

Sequence of NOP instructions that precedes shellcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NOP instructions do what?

A

Nothing, then move to the next instruction until they find the shellcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Snort and Bro use generic signatures to detect…

A

Shellcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metasploit singles

A

Self contained payloads that function on their own

17
Q

Metasploit stagers

A

Sets up network connection between attacker and victim.

18
Q

Stages

A

Actual malicious payload. Execution and exploitation.

Self contained.

19
Q

Meterpreter

A

Executed only in memory.

20
Q

Metasploiit NoNX

A

Circumvents DEP

21
Q

DLL Injection

A

Stage payload is injected into compromised host process running in memory. Never written to disk.

22
Q

.,\

A

Used for directory traversal. Up a level.

23
Q

SQL Injection Consequences

A

Auth bypass
Information disclosure
Compromised CIA
Remote Code Execution

24
Q

uricontent:”.pl”

A

URI’s that end in .pl (Perl)

25
Q

Pcre:”/(%27)…: (regex)

A

Perl Compatible Regular Expression

26
Q

SID (in IPS signature)

A

Snort Identifier

27
Q

Stored XSS

A

Malicious code stored on the web server.

Done by submitting it to forms (comment boxes)

28
Q

Reflected (nonpersistent) XSS

A

HTML code in a URL. User needs to click the link.

29
Q

Punycode

A

Converts Unicode characters to ASCII format.

30
Q

Punycode format

A

xn—.

fàcebook.com in Punycode becomes xn–fcebook-lta.com

31
Q

xn–

A

Symbolizes beginning of converted punycode URL

32
Q

DNS tunneling

A

Using alternative malicious external DNS server