Section 1.3 Analyze potential indicators associated with application attacks Flashcards
In what kind of attack does the attacker input data that exceeds the limits recognized by a program causing the program or even entire system to crash?
Buffer overflow attack
Buffer overflow attacks typically result in?
command shell access that gives the attacker admin privileges
Buffer overflow attacks are caused primarily by?
Improper input handling
What concept could ensure that out-of-range numerical values are handled in safer ways, such as by converting the value to test, truncating or converting it, or ignoring unexpected values?
Error handling
What kind of attacks take advantage of the limited resources that most modern computer systems have available for software applications?
Resource Exhaustion
In what kind of attack does the attacker exploit a bug within an application to bypass the application and gain elevated privileges that enable the attacker to execute system commands?
Privilege Escalation
Protection against privilege escalation requires that programmers do what?
use input validation and test their code for bugs and exploits before releasing the software
What do you call a type of website application vulnerability that allows malicious users to inject malicious code into dynamic websites that rely on user input?
Cross-Site Scripting
What do you call a type of attack that relies on the ability to use a user’s current web browsing state and trick that user into navigating to a website that contains malicious code?
Cross-site request forgery
What type of attack allows a malicious user to submit arbitrary requests to an XSRF-protected-endpoint by modifying the endpoint to which the client-side code makes an HTTP request with a vailed XSRF token, often by form submission?
Client-side request forgery
In what type of attack does the attacker exploit the underlying functionality on a server to read or update internal resources that the attacker shouldn’t have access to?
Server-side request forgery
What kind of attacks seek to use the API to achieve an impact such as a denial of service, data exfiltration, or code injection?
API attacks
In what kind of attacks does an attacker wrap malicious code around legitimate code in an attempt to elevate their privilege or install backdoors?
Shimming attack
In what kind of attack does the attacker take advantage of improvements to existing code by adding malicious code to the improvement process?
Refactoring attack
What is a type of web application attack that inserts invalid or malicious data into HTTP headers?
Header manipulation