Vulnerabilities Flashcards

1
Q

A type of vulnerability that allows an attacker to run arbitrary code on a remote system, often leading to complete system compromise. RCE vulnerabilities can be exploited to execute malicious code on a target machine.

Example: An attacker exploits a web application vulnerability to upload and execute a malicious script on the server, giving them control of the system.

A

RCE (Remote Code Execution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security vulnerability that allows an attacker to manipulate an SQL query by injecting malicious SQL code, potentially allowing them to read, modify, or delete data from the database.

Example: An attacker enters OR 1=1 in a login form, bypassing authentication and gaining unauthorized access to the system.

A

SQLi (SQL Injection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A vulnerability that allows an attacker to inject malicious scripts into web pages viewed by other users, which can steal cookies, session tokens, or perform actions on behalf of the user.

Example: An attacker submits a script in a comment section of a website, which then gets executed in other users’ browsers, stealing their session cookies.

A

XSS (Cross-Site Scripting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of attack that forces a user to perform unwanted actions on a website where they are authenticated, often without the user’s knowledge. The attacker tricks the user into submitting a request on their behalf.

Example: An attacker sends a user a link that triggers a fund transfer request on their banking website, transferring money without the user’s consent.

A

CSRF (Cross-Site Request Forgery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software programmed into hardware devices that provides low-level control and functionality. It is typically embedded in the device and not easily altered.

Example: The basic functions of a router, like managing traffic, are controlled by embedded software.

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that acts as a bridge between different applications, services, or databases, allowing them to communicate with each other.

Example: Software that enables communication between a web server and a database server.

A

Middleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A program that allows an operating system to interact with hardware components like printers, graphics cards, or storage devices.

Example: Software that allows a computer to print documents on a connected printer.

A

Device Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The lowest-level programming language, consisting of binary code (0s and 1s) that a computer’s processor can directly execute.

Example: A program is compiled into binary instructions that a computer’s CPU can understand and execute.

A

Machine Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The point at which a product, service, or system is no longer supported or maintained by the manufacturer or provider.

Example: The software stopped receiving security updates after it reached this stage.

A

EOL (End of Life)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of managing the development, maintenance, and eventual retirement of software applications.

Example: These tools help track the progress and bugs in a software development project.

A

ALM (Application Lifecycle Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a vendor stops providing updates, fixes, or support for a product or service.

Example: The device will no longer receive official patches or customer support after this point.

A

EOS (End of Support)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A structured approach to software development that includes planning, design, development, testing, and maintenance.

Example: The structured approach guides teams from initial concept to final deployment and support.

A

SDLC (Software Development Life Cycle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security vulnerability where an attacker can break out of a virtual machine (VM) and gain unauthorized access to the host system or other VMs.

Example: An attacker exploiting this vulnerability could execute commands on the hypervisor from within the this.

A

VM Escape (Virtual Machine Escape)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A layer of software that enables the creation and management of virtual machines by providing virtualization resources to them.

Example: This allocates physical resources such as CPU and memory to virtual machines.

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The practice of reusing system resources, such as memory or CPU, in different processes or tasks to optimize performance.

Example: Allocating the same memory space to multiple processes at different times to conserve resources.

A

Resource Reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A security attack where a user gains higher-level access than they are authorized for, often allowing them to perform restricted actions.

Example: An attacker exploiting a vulnerability to gain administrative rights on a system.

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A condition where a system’s resources, such as memory or CPU, are completely consumed, leading to system instability or crashes.

Example: A denial-of-service attack that consumes all available server resources, causing it to fail.

A

Resource Exhaustion

18
Q

When multiple sessions or users access a system at the same time, which can affect performance or security.

Example: Multiple users accessing the same server at once, potentially leading to slower response times or data conflicts.

A

Concurrent Session Usage

19
Q

The process of removing software restrictions on an iOS device, allowing the installation of apps and tweaks not approved by Apple.

Example: Installing apps from third-party sources that aren’t available in the official app store

A

Jailbreaking

20
Q

The act of installing applications or content onto a device without using the official app store or marketplace.

Example: Installing an app on a smartphone from a source other than Google Play or the Apple App Store.

A

Sideloading

21
Q

The process of gaining full administrative control over an Android device, bypassing manufacturer restrictions to modify system files.

Example: Modifying system settings or installing custom ROMs on an Android device.

A

Rooting

22
Q

Software that is not malicious but can cause unwanted effects, such as slow performance, pop-ups, or privacy concerns.

Example: A program that collects and shares non-sensitive user data without malicious intent.

A

Grayware

23
Q

Software designed to display unwanted advertisements on a user’s device, often through pop-ups or banners.

Example: A free app that shows frequent ads to users in exchange for access to its features.

A

Adware

24
Q

Malicious software that encrypts a user’s files or locks access to a system, demanding payment for restoration.

Example: A hacker encrypts important files on a computer and demands money to decrypt them.

A

Ransomware

25
Q

Malicious software that secretly monitors and collects user activity, often for malicious purposes such as identity theft.

Example: Software that tracks a user’s browsing habits and sends the data to third parties without permission.

A

Spyware

26
Q

A type of malware that disguises itself as a legitimate program or file to trick users into installing it, often causing harm or giving unauthorized access.

Example: A file disguised as a helpful software update that actually installs malicious software on a device.

A

Trojan Horse

27
Q

A type of malware that allows an attacker to remotely control an infected device without the user’s knowledge.

Example: An attacker uses this malware to monitor activities and steal sensitive information from a compromised system.

A

RAT (Remote Access Trojan)

28
Q

Software that may not be malicious but can negatively impact system performance or user experience, often bundled with other software.

Example: An unwanted toolbar that is installed along with a free download, slowing down the system.

A

PUP (Potentially Unwanted Program)

29
Q

A type of malware that replicates itself and spreads across networks without needing to attach to a host file or program.

A

Worm

30
Q

A type of malware that operates in memory and doesn’t write any files to the hard drive, making it harder to detect.

A

Fileless Virus

31
Q

A piece of malicious code triggered by a specific condition or event, such as a certain date or the presence of a particular file.

A

Logic Bomb

31
Q

A program that automatically performs tasks, often maliciously, as part of a botnet controlled by an attacker.

A

Bot

32
Q

Unnecessary or unwanted software that comes pre-installed on a device, often consuming system resources and slowing down performance.

Example: A new laptop that comes with trial software and additional apps that the user doesn’t need or want.

A

Bloatware

33
Q

A type of spyware that records keystrokes on a device, often used to steal sensitive information like passwords.

Example: A malicious program that tracks every key pressed on a keyboard, sending the data to an attacker.

A

Keylogger

34
Q

A tool used to identify security weaknesses in a system, network, or application that could be exploited by attackers.

Example: A security tool that scans a website for outdated software versions or weak configuration

A

Vulnerability Scanner

35
Q

A self-replicating type of malware that spreads through networks without needing to attach to a host file, often causing disruption.

Example: Automatically spreads across a network, infecting multiple devices without any user intervention.

A

Computer Worm

36
Q

A tool used to capture and analyze network traffic, often used by attackers to intercept sensitive data being transmitted over a network.

A

Packet Sniffer

37
Q

A method of bypassing normal authentication to gain unauthorized access to a system, often installed by malware or attackers.

A

Backdoor

38
Q

A type of malware designed to hide the presence of malicious activities or files on a system, often giving attackers full control.

A

Rootkit

39
Q

The process of copying the information stored on a Radio Frequency Identification (RFID) tag to create a duplicate, often for malicious purposes.

Example: An attacker clones an access card to gain unauthorized entry into a secure building.

A

RFID Cloning