Security Flashcards

1
Q

What is a Insecure Direct Object Reference (IDOR)?

A

IDORs occur when an application provides direct access to objects based on the user-supplied inout.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are IDORs problematic?

A

As a result of this vulnerability, attackers can bypass authorization and access resources in the system directly by interceptiong a POST request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is poor data validation?

A

Poor data validation occurs when an application does not validate submitted data correctly or sufficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to fix poor data validation/

A

When data is submitted to a web application, it should ensure that the data is strongly typed, has correct syntax, is within length boundaries, contains only permitted characters and within range boundaries. The data validation process should ideally be performed on the client side and again on the server side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a security misconfiguration?

A

A security misconfiguration is any configuration in any part of the app (database server, 3rd-party libraries, custom code settings…) which can be exploited by an attacker to perform any action they should not be able to. The impact of these issues vary from which configuration is being exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can you give examples of security misconfiguration?

A
  • Attackers can exploit security misconfiguration by logging in with default log in credentials to the application, the operating system or any of the public services it is running (Such as Database or Samba services) to gain unauthorized access to or knowledge of the system.
  • Attackers can also exploit bad security configurations through unpatched flaws, unprotected files and directories to gain unauthorized access to or knowledge of the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to fix security misconfigurations?

A
  • Automated scanners are useful for detecting missing patches, misconfigurations, use of default accounts or unnecessary services.
  • A process should be implemented for keeping all software up to date, with patches occurring in a timely manner to each deployed environment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where are broken authentication and session management flaws commonly found?

A

In functionalities such as logout, password management, secret question and account update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 5 scenarios vulnerable to broken authentication and session management flaws?

A
  1. User credentials are stored with insufficient cryptographic levels.
  2. User credentials can be guessed or changed through poor account management.
  3. Session identifiers are exposed in the URL.
  4. The application does not use sufficient transport protection (Such as HTTPs or sFTP).
  5. Session parameters can be manually changed by the user through application functionality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a failure to restrict URL access?

A

This occurs when an application hides functionality from basic users. In an application that fails to restrict URL access, administration links are only put onto the page if the user is an administrator. If users discover a page’s address, they can still access it via URL access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to fix a failure to restrict URL access?

A

Preventing unauthorized URL access requires selecting an approach for requiring proper authentication and proper authorization for each page. The easier the authentication is to include in a page the more likely that all pages will be covered by the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly