Section 1.3 Analyze potential indicators associated with application attacks Flashcards

1
Q

In what kind of attack does the attacker input data that exceeds the limits recognized by a program causing the program or even entire system to crash?

A

Buffer overflow attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Buffer overflow attacks typically result in?

A

command shell access that gives the attacker admin privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Buffer overflow attacks are caused primarily by?

A

Improper input handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What concept could ensure that out-of-range numerical values are handled in safer ways, such as by converting the value to test, truncating or converting it, or ignoring unexpected values?

A

Error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of attacks take advantage of the limited resources that most modern computer systems have available for software applications?

A

Resource Exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In what kind of attack does the attacker exploit a bug within an application to bypass the application and gain elevated privileges that enable the attacker to execute system commands?

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protection against privilege escalation requires that programmers do what?

A

use input validation and test their code for bugs and exploits before releasing the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you call a type of website application vulnerability that allows malicious users to inject malicious code into dynamic websites that rely on user input?

A

Cross-Site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do you call a type of attack that relies on the ability to use a user’s current web browsing state and trick that user into navigating to a website that contains malicious code?

A

Cross-site request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of attack allows a malicious user to submit arbitrary requests to an XSRF-protected-endpoint by modifying the endpoint to which the client-side code makes an HTTP request with a vailed XSRF token, often by form submission?

A

Client-side request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In what type of attack does the attacker exploit the underlying functionality on a server to read or update internal resources that the attacker shouldn’t have access to?

A

Server-side request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of attacks seek to use the API to achieve an impact such as a denial of service, data exfiltration, or code injection?

A

API attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In what kind of attacks does an attacker wrap malicious code around legitimate code in an attempt to elevate their privilege or install backdoors?

A

Shimming attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In what kind of attack does the attacker take advantage of improvements to existing code by adding malicious code to the improvement process?

A

Refactoring attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a type of web application attack that inserts invalid or malicious data into HTTP headers?

A

Header manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of attack injects XML content into the XML application, causing the application to process data according the the malicious injected XML codes?

A

XML injection attacks

17
Q

What kind of attack exploits libraries by inserting code into a DLL and then having the original process load and execute the code within the DLL?

A

DLL injection attacks

18
Q

What do you call a type of access vulnerability that enables a hacker to get unauthorized access to files on a web server other than the public files that are served on the website?

A

Directory Traversal

19
Q

What do you call the situation where an intruder can execute a command at will by exploiting a vulnerability on system, usually in an application?

A

Arbitrary code execution/remote code execution

20
Q

What kind of attack occurs when an unauthorized user captures network traffic and then send the communication to its original destination, acting as the original sender?

A

Replay attack

21
Q

What is a vulnerability that allows an attacker who knows the details of an application server’s directory tree to manually traverse the directory using input commands in the URL location bar or input forms in the application?

A

Directory Traversal

22
Q

What occurs when a malicious hacker is able to access a user’s session cookie and then use the session information to make unauthorized requests as the user?

A

Session Hijacking

23
Q

What are caused primarily by poor input validation that allows illegal data to be entered into the application, causing processing limits to be exceeded?

A

Buffer overflows