Web Security - Injections and Attacks Flashcards

1
Q

Types of Injection Attacks

Web Security

A
  • Command Injection Attacks
  • File Inclusion Attacks
  • HTML Injections
  • SQL Injections
  • Cross-Site Scripting/XSS Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define

Command Injection Attacks

Web Security

A

When an attacker injects malicious code into the shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define

File Inclusion Attack

Web Security

A

When an application is tricked into running or exposing files on the server with PHP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define

HTML Injection Attack

Web Security

A

Using tags to modify an HTML application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define

SQL Injection

Web Security

A

Manipulating SQL queries to select, insert, update, and delete info/data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Defenses against Injection Attacks

Web Security

A
  • Sanitization of user input to remove meta-characters and default allow
  • Use PHP sanitization to clean/validate input data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defenses against SQL Injections

Web Security

A
  • Prohibit user-supplied data to modify
  • Store procedures/isolate app from SQL operations
  • Prepare statements for clear separation of data and code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define

Cross-Site Scripting/XSS Attacks

Web Security

A

Injected malicious executable scripts using script tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two types of XSS attacks?

Web Security

A

Stored and reflected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define

Stored XSS Attack

Web Security

A

Permanently stored injected code on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define

Reflected XSS Attack

Web Security

A

Injected code reflected off victim’s server that is controlled by the attacker and activated through victim clicking the link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defenses against XSS Attacks

Web Security

A

Sanitize all data and input to prevent new code and characters through output escaping and content security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define

Output Escaping

Web Security

A

Sepcial characters are replabledwith character entities to prevent user input from having characters that build HTML elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define

Content Security Policy

Web Security

A

Allows server to specifiy what is or isn’t allowed during page rendering with the help of the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of UI Attacks

Web Security

A
  • Phishing Attacks
  • Manipulating URLS
  • Clickjacking
  • Click Interception
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe

Phishing Attacks

Web Security

A

Mimicking legit sites to lure users and reveal sensitive data

17
Q

Defenses against Phishing Attacks

Web Security

A
  • Search engine removes and filters out sites
  • User checks the site they’re on or before clicking
18
Q

Ways to manipulate URLs

Web Security

A

URL Obfuscation/Types and Internationalized Domain Name Homograph Attacks

19
Q

Define

URL Obfuscation/Types

Web Security

A

Choosing similar looking URLs

20
Q

Provide an example of URL Obfuscation/Types

Web Security

A

google.com versus gooogle.com

21
Q

Define

Internationalized Domain Name Homograph Attack

Web Security

A

Obscuring the URL such that a character is in a different font or looks different

22
Q

Define

Clickjacking/UI Redressing

Web Security

A

Luring the user to click on an element not associated with the main frame (uses overlapping transparent iframes)

23
Q

What does clickjacking bypass?

Web Security

A

SOP

24
Q

What does clickjacking compromise?

Web Security

A

Context Integrity

25
Q

Define

Context Integrity

Web Security

A

Visual + Temporal Integrity

26
Q

Describe

Visual Integrity

Web Security

A

The target and pointer are visible and accounted for

27
Q

Describe

Temporal Integrity

Web Security

A

If the target is clicked, then the target is checked.
If the pointer is clicked, then the pointer is checked.

28
Q

Defenses against clickjacking

Web Security

A
  • User confirmation before taking sensitive actions
  • UI randomization - sensitive information is placed randomly
  • Framebusting
  • X-Frame Options - browser can/can’t render
29
Q

Limitations with clickjacking defenses

Web Security

A
  • Degrades user experience
  • May be unreliable or easily defeated
30
Q

Define

Click Interception

Web Security

A

Forcing a user to visit a URL by taking over their pointer