Vulnerabilities Flashcards
A type of vulnerability that allows an attacker to run arbitrary code on a remote system, often leading to complete system compromise. RCE vulnerabilities can be exploited to execute malicious code on a target machine.
Example: An attacker exploits a web application vulnerability to upload and execute a malicious script on the server, giving them control of the system.
RCE (Remote Code Execution)
A security vulnerability that allows an attacker to manipulate an SQL query by injecting malicious SQL code, potentially allowing them to read, modify, or delete data from the database.
Example: An attacker enters OR 1=1 in a login form, bypassing authentication and gaining unauthorized access to the system.
SQLi (SQL Injection)
A vulnerability that allows an attacker to inject malicious scripts into web pages viewed by other users, which can steal cookies, session tokens, or perform actions on behalf of the user.
Example: An attacker submits a script in a comment section of a website, which then gets executed in other users’ browsers, stealing their session cookies.
XSS (Cross-Site Scripting)
A type of attack that forces a user to perform unwanted actions on a website where they are authenticated, often without the user’s knowledge. The attacker tricks the user into submitting a request on their behalf.
Example: An attacker sends a user a link that triggers a fund transfer request on their banking website, transferring money without the user’s consent.
CSRF (Cross-Site Request Forgery)
Software programmed into hardware devices that provides low-level control and functionality. It is typically embedded in the device and not easily altered.
Example: The basic functions of a router, like managing traffic, are controlled by embedded software.
Firmware
Software that acts as a bridge between different applications, services, or databases, allowing them to communicate with each other.
Example: Software that enables communication between a web server and a database server.
Middleware
A program that allows an operating system to interact with hardware components like printers, graphics cards, or storage devices.
Example: Software that allows a computer to print documents on a connected printer.
Device Driver
The lowest-level programming language, consisting of binary code (0s and 1s) that a computer’s processor can directly execute.
Example: A program is compiled into binary instructions that a computer’s CPU can understand and execute.
Machine Code
The point at which a product, service, or system is no longer supported or maintained by the manufacturer or provider.
Example: The software stopped receiving security updates after it reached this stage.
EOL (End of Life)
The process of managing the development, maintenance, and eventual retirement of software applications.
Example: These tools help track the progress and bugs in a software development project.
ALM (Application Lifecycle Management)
When a vendor stops providing updates, fixes, or support for a product or service.
Example: The device will no longer receive official patches or customer support after this point.
EOS (End of Support)
A structured approach to software development that includes planning, design, development, testing, and maintenance.
Example: The structured approach guides teams from initial concept to final deployment and support.
SDLC (Software Development Life Cycle)
A security vulnerability where an attacker can break out of a virtual machine (VM) and gain unauthorized access to the host system or other VMs.
Example: An attacker exploiting this vulnerability could execute commands on the hypervisor from within the this.
VM Escape (Virtual Machine Escape)
A layer of software that enables the creation and management of virtual machines by providing virtualization resources to them.
Example: This allocates physical resources such as CPU and memory to virtual machines.
Hypervisor
The practice of reusing system resources, such as memory or CPU, in different processes or tasks to optimize performance.
Example: Allocating the same memory space to multiple processes at different times to conserve resources.
Resource Reuse
A security attack where a user gains higher-level access than they are authorized for, often allowing them to perform restricted actions.
Example: An attacker exploiting a vulnerability to gain administrative rights on a system.
Privilege Escalation