Web Application Attacks Flashcards

1
Q

attacker injects a pointer in a web form to an exploit hosted elsewhere

A

File Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

attacker gains shell access using Java or similar

A

Command Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

)(&)

A

LDAP Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

inject query strings in order to bypass authentication
Uses XML to format information
Messages are “one way” in nature

A

SOAP Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attempts to write data into application’s buffer area to overwrite adjacent memory, execute code or crash a system
Inputs more data than the buffer is allowed
Includes stack, heap, NOP sleds and more

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

inputting javascript into a web form that alters what the page does
executes a malicious script in your browser

A

XSS (Cross-site scripting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

forces an end user to execute unwanted actions on an app they’re already authenticated on
sends a malicious request on your behalf.

A

Cross-Site Request Forgery (CSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attacker logs into a legitimate site and pulls a session ID; sends link with session ID to victim. Once vitcim logs in, attacker can now log in and run with uer’s credentials
similar to CSRF

A

Session Fixation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

injecting SQl commands into input fields to produce output

input “’ OR 1 = 1 –” into a login field

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

uses same communication channel to perform attack
Usually is when data pulled can fit into data exported (where data goes to a web table)
Best for using UNION queries

A

In-band SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

uses different communication channels (e.g. export results to file on web server)

A

Out-of-band SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

error messages and screen returns don’t occur; usually have to guess whether command work or use timing to know

A

Blind/inferential SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

adds header response data to an input field so server splits the response
Can be used to redirect a user to a malicious site
Is not an attack in and of itself - must be combined with another attack

A

HTTP Response Splitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly