Weak Points #2 Flashcards
Cognitive Password
A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity.
SQL Injection: Breaking a valid SQL Request
Use a single quote:
The single quote character (‘) is the character limiter in SQL. With a single quote,’ you delimit strings, and therefore you can test whether the programmer has properly escaped the strings in the targeted application.
If not escaped directly, you can end any string supplied to the application and add other SQL code after it. This is a common technique for SQL injections.
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple-A) management for users who connect and use a network service.
The RADIUS protocol utilizes an obfuscated password created from the shared secret and creates an MD5 hash of the authentication request to protect the communications.
Data Sanitization: Clearing
Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques.
Clearing involves overwriting data once (and seldom more than three times) with repetitive data (such as all zeros) or resetting a device to factory settings.
Armored Virus
A type of virus that use various techniques to protect it from being reverse engineered. This includes changing its code during execution and encrypting its payloads.
COPE Policy
Corporate Owned, Personally Enabled:
A business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally owned
Can facilitate MDM/MAM
Cookies: Secure Attribute
When a cookie has the Secure attribute, the user agent includes the cookie in an HTTP request only if transmitted over a secure channel (typically HTTPS).
Although seemingly useful for protecting cookies from active network attackers, the Secure attribute protects only the cookie’s confidentiality.
Port Scanning
Using a tool like nmap, an attacker can create an SYN scan across every port in the range against the desired target. A port scan or SYN scan may trigger an alert in your IDS.
While scanners support more stealthy scans, default scans may connect to each port sequentially.
Prepending
Used in data URL phishing
Adding code to the beginning of a presumably safe file
Activates when the file is opened
XSS Characteristics
Exploits the trust a user’s web browser has in a website
A malicious script is injected into a trusted website
User’s browser executes attacker’s script
Session ID Characteristics
A unique identifier assigned by the website to a specific user
A piece of data that can be stored in a cookie, or embedded as a URL parameter
Stored in a visitor’s web browser
Null-pointer Dereference
An attempt to read a variable value from an invalid memory address
Integer Overflow
A programming error where an application tries to store a numeric value in a variable that is too small to hold it
SSRF
Server-Side Request Forgery:
Allows an attacker to take control over a server and use it as a proxy for unauthorized actions
XSRF Characteristics
Exploits the trust a website has in the user’s web browser
A user is tricked by an attacker into submitting unauthorized web requests
Website executes attacker’s request
Memory Leak
A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required