Threat, Vulnerabilities and Mitigations: Indicators of Application attack Flashcards

1
Q

Injection attack?

A

Injection attacks

These are common in web-application attacks. Remember to check the log files for your HTTPS server. Here’s an example of checking an Apache log file: + /var/log/apache2/error.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Buffer overflow attacks?

A

Buffer overflow attacks

Crashes are a common hallmark of buffer exploitations. - Accomplish a DDoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Replay Attacks?

A

Replay attacks

These are typically malware attacks that: + Capture data such as: + Keyboard inputs. + Memory data. + Network traffic. + Modify captured data, such as network sources and destinations. + Exfils captured data such as: + Credentials + Session IDs/Tokens + Hashes, such as Pass-the-Hash.

Indicators of replay attacks include info in logs: + Failures, successes, and other transaction info such as:

Logins: odd times, locations, and systems.

Changes

Network traffic patterns

Duplicate requests

Antivirus/endpoint detection and response (AV/EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Privileged escalation attacks?

A

Indicators include:

Unauthorized administrative access: check logs for administrative access from unusual devices and accounts or from usual accounts but at unusual times and places.

Unusual administrative changes: these could include creation of new accounts or changes to configurations of:

Firewall rules

AV exceptions

Registry entries

Files and directories

Log Tampering

Use of administrative tools such as:

PowerShell

Windows Management Instrumentation command-line (WMIC) tool,

Microsoft Antimalware Scan Interface (AMSI) bypass.

Scheduled Tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Directory Traversal Attack?

A

Directory traversal attacks – If you are in a web application or search for files with, maybe I can move outside of the context of the confines that I’ve been set in.

Log checks:

../

..%2F

%2E%2E%2F

%252E%252E%252F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly