Threats And Attacks On Endpoints Flashcards
Zero-day Attack
Unknown vulnerability
New software
Impossible to detect
Hard to patch
Default Configurations
Weak
Out-of-the-box
Open permissions
Weak configuration
Everyone
777 on Linux
Unsecured Root Accounts
Weak configuration
Weak password
Weak Encryption
Weak configuration
Length of key
Cross-site scripting (XSS)
Web application vulnerability
Malicious scripts on victims browser
Same Origin Policy
Allowing execution of scripts that come from same domain
Reflected Cross Site Scripting
Most common XSS
Non-persistent XSS
Injects malicious scripts in any fields and accepts and sends to server
Stored XSS
Persistent cross site scripting
Malicious script by attacker stored on web server or database
Might affect more than one user
DOM Based XSS
JavaScript failing
SQL Injection
Injecting special characters into apps input field
Resulting sensitive info gathered
Error Based SQL Injection
Confirms vulnerability by database error messages
Blind SQL Injection
Happens by making SQL query so database execution engine is made to answer yes or no questions
Second Order SQL Injection
Malicious input stored in database table and used as an input parameter in a different SQL query in a different place
Race Condition
When app processes multiple operations at the same time causing failures in execution
Path Manipulation
Upload malicious files into app