SecPlusP4 Flashcards
(346 cards)
How does a DNS amplification attack exploit the DNS resolution process?
By sending spoofed DNS queries to open DNS servers
What is one way to mitigate the impact of DNS responses?
Limit the size of DNS responses
How can DNS tunneling be used to bypass firewall rules?
Encapsulates non-DNS traffic over port 53
What is one way to mitigate domain hijacking?
Monitor and analyze DNS logs for unusual patterns
What is a DNS Zone Transfer Attack?
Attempts to obtain an entire DNS zone data copy
What can a DNS Zone Transfer Attack expose?
Sensitive information about a domain’s network infrastructure
What can a Directory Traversal Attack allow access to?
Commands, files, and directories that may or may not be connected to the web document root directory
What character do Windows systems use as the default directory separator?
\
What character do Unix-like systems use as the directory separator?
/
What can directory traversals be used to do?
Access any file on a system with the right permissions
How can attackers hide directory traversal attempts?
Using encoding (%2e%2e%2f represents ../)
What is file inclusion vulnerability?
A web application vulnerability that allows an attacker to download or upload files
What is remote file inclusion?
Injecting a remote file into a web app or website
What is an example of remote file inclusion?
Attacker executing a script with a remote file URL
What is local file inclusion?
Adding a file to a web app or website that already exists on the server
What is an example of local file inclusion?
Attacker adding a file to the web app with server file URL
What do ../ in logs pertain to?
Directory traversals
What is a directory traversal attack?
Attacker tries to access files outside the target directory
How can input validation help prevent directory traversals and file inclusion attacks?
Verify and sanitize user input to ensure it conforms to expected formats
What is arbitrary code execution?
Running an attacker’s code without restrictions
What is remote code execution?
Executing code remotely, often over the internet
What is privilege escalation?
Gaining higher-level permissions than originally assigned
Why is privilege escalation dangerous?
Allows attackers to operate with elevated privileges, such as administrator or root access
What is vertical privilege escalation?
Going from normal user to higher privilege (e.g., admin or root)