Section 2.3 Flashcards

1
Q

What is Memory Injection?

A

Memory injecting is the act of injecting a malware in the memory by adding it to an existing process. This would give the malware the same rights and permissions as the process it was injected to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is DLL Injection?

A

DLL is Dynamic Link Library
DLL injection occurs when an attacker injects a path to a malicious DLL to run as part of a target process in memory. Once the process reaches the part of the malicious code, it will run the malicious DLL that was referenced in the target process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Buffer Overflow?

A

A buffer overflow is when an attacker can write more than it is expected into a particular area of memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a race condition?

A

A race condition is when two events happen at nearly at the same time within an application and the application doesnt take into account that these two conditions may be operating simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does TACTOU stand for?

A

Time of Check to Time of Use attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SQL Injection (SQLi)?

A

SQL (Structured Query Language) Injection or (SQLi) is a code injection using SQL into a web browser, usually in a form or field that attempts to retrieve more data than allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s a very common SQL injection?

A

A very common SQL injection is when the user enters a SQL query followed by “ or ‘1’ = ‘1’ “. Since 1 always equals 1, this is an attempt to retrieve all information from the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cross-site Scripting (XSS)?

A

XSS (Cross-site scripting) is a security flaw that allows information from one site to be shared with another site.

XSS commonly uses JavaScript for the attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Non Persistent XSS Attack?

A

A Non-Persistent XSS Attack (Reflected XSS) is a type of cross-site scripting vulnerability where an attacker injects a malicious script into a web application, which is then sent to the target user (using phishing methods) and executed in their browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Persistent XSS Attack?

A

A Persistent XSS Attack (Stored XSS) is a type of cross-site scripting vulnerability where malicious scripts are permanently stored on a server and are executed in the browsers of users who visit the affected page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define and Describe the difference between EOL and EOSL

A

EOL stands for End of Life
EOSL stands for End of Service Life

For EOL the manufacturer might still provide important patches for the device, but in the case of EOSL the manufacturer will no longer service or provide patches for this device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Virtual Machine Escape?

A

This is the ability to break out of the current VM and interact with the host system or other guest VMs in the same host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MFA?

A

Multi Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DoS attack?

A

DoS stands for Denial of Service.
This attack type has a goal to make the resource unavailable to users, effectively “denying the service”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a DDoS attack?

A

Distributed Denial Of Service.
A DDoS attack is a type of cyberattack where multiple compromised systems, often referred to as a botnet, are used to flood a target system, service, or network with an overwhelming amount of traffic to disturb its availability, effectively “denying the service”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Authentication Bypass attack?

A

This is an attack type that takes advantage of weak or faulty authentication which allows users through without authenticating.

17
Q

What is Directory Traversal attack?

A

This is a type of attack that allows an attacker to access files and directories that are outside the intended directory of the web application.

18
Q

What is a Remote Code Execution (RCE) attack?

A

This specific attack type is related to the attacker injecting malicious code to vulnerable systems.

19
Q

What are Supply Chain Exploits / Attacks?

A

A supply chain exploit occurs when attackers compromise third party vendors that are used by a company. The attacker is taking advantage of the trust between the company and the third party vendor, and is inserting malicious code into for example a software update for a software component. When the company updates their third party component, the malicious code in the third party component software will attack the company.

20
Q

What are some common Misconfiguration Vulnerabilities?

A

Open permissions - leaving the “door open” accidentally on very sensitive information.

Unsecured Admin Accounts - Either no password, or very easy to guess password.

Insecure Protocols - Using protocols such as telnet, ftp, SMTP, IMAP which transfer data unencrypted through the network

Default Settings - Every application and device has a default login. These must be changed since this information is publicly available.

Open ports and services - Opening ports and services that are not mandatory to be used

21
Q

What is Jailbreaking/Rooting?

A

Jailbreaking (For iOS devices) and Rooting (for Android devices) is the process of replacing the operating system of the phone to gain additional access to the phone and its security.

22
Q

What is Sideloading?

A

Sideloading is the ability to install apps in your Phone that are outside of the App Store. These are apps that are usually not approved to be in the App Store and may contain malicious code since these apps have not been audited or approved.

23
Q

What is Zero-day attacks?

A

A Zero Day attack is an exploit that does not have a patch or a method of mitigation. This means that there is a race to create a patch of this vulnerability since it’s difficult to defend against it.