Threats Vulnerabilities and Mitigations 2.3-2.4 Flashcards
Memory Running processes
Dynamic Link Libraries
Threads
Buffers
Memory Management functions
Memory injection
Add code into the memory of an existing process.
DLL injection
Dynamic-link library
- A window library containing code and data
Many applications can use this library
-Attackers inject a path to a malicious DLL.
Buffer Overflows
Overwriting a buffer of memory additional memory overflows into another area of memory.
Attackers will spend a long of time looking for opening. Not a simple exploit - takes time to avoid crashing things.
Race condition
When two events happen at nearly the same events.
TOCTOU
Time of check to time of use attack:
Value might change between the time you checked between the time of use.
Malicious updates . what is it and how do you follow best practices.
Attackers can put malicious code inside the update.
Follow best practices relating to downloading and updating.
Look at where the download file is coming from - confirm the source
Download from the site directly
Many operating systems only allowed signed apps .
Automatic updates - Relatively trustworthy
Operating System
A foundational computing platform which are remarkably complex.
When does Microsoft release security patches for the OS
2nd Tuesday of each the month
Best Practices for OS vulnerabilities
Always update
May require testing before deployment
May require a reboot.
SQL injection (Structured Query Language).
A code injection attack where an attacker would put their own code into a data stream
Cross Site Scripting XSS
An attacker sends a link containing a malicious script to the victim.
Victim clicks link and visits legitimate site
Legitimate site loads in the victims browser.
Malicious script sends victims data to attacker
Hardware vulnerabilities
Things like light bulbds, garage doors, ring doorbells. (IOTS).
A Physical device that can be connected to the network.
Firmware
The software inside the hardware. Vendors are the only ones who can fix the hardware
EOL or EOSL
End of Life: manufacturer stops selling a product, May continue supporting the product.
End of Service Life: manufacturer stops support and sale of the product.
Legacy Platforms
Some devices remain installed for a long time, may have older operating systems. May be running end of life software but are critical to the network.
Virtualisation Security
?
Cloud specific Vulnerabilities
Cloud adoption - difficult to find a company not using the cloud.
DoS - Denial of Service.
Authentication Bypass
Directory Traversal - Fault configurations put data at risk.
Remove code execution.
Supply Chain Risk
Attackers can infect any step along the way. One exploit can infect the entire chain.
Open Permissions
Sometimes data is left open on the internet.
Misconfiguration
Inherent vulnerabilities in using the default settings of a software. Default configurations and credentials
Why are mobile devices hard to secure?
Almost always in motion
Relatively small
Constantly connected to the internet
Packed with sensitive data
What is sideloading
The ability to install application outside the scope of the app store.
Malicious apps can be a significant security concern.
Zero day vulnerability
When attackers are able to attach a vulnerability without a patch or method of mitigation because the vulnerability is unknown.