XSS, Hardware vulnerabilities, Cloud-specific, Supply chain Flashcards
(21 cards)
XSS (Cross-site scripting)
Takes advantage of a trust a user has for website.
**commonly uses JavaScript
Reflected XSS
Script is embedded in URL executes in the victim’s browser.
User is the person who executes the code.
Persistent (stored) XSS
attacker injects malicious code into web app, and the app then stores and serves that malicious code to other users
Protecting against XSS include:
-Careful clicking untrusted links
-Consider disabling JavaScript
-Update browser/apps
-Don’t allow users to add their own scripts
Why are hardware potential security risks?
perfect entry point form an attack
Firmware
software inside of hardware
End of Life (EOL)
manufacturer stops selling, marketing, and developing the product.
End of service life (EOSL)
○ manufacturer ceases providing all support services
○ Support is no longer available
List some virtualization vulnerabilities?
-Local privilege escalation
-Command injection
-Info disclosure
Hypervisor
Manages the relationship between physical & virtual resources.
True or false: RAM is allocated and shared between VMs
True
True or false: Data can be inadvertently be shared between VMs
True
Cloud specific vulnerabilities (attacking the service) include:
-Authentication bypass
-Directory traversal
-Remote code execution
Authentication bypass
Take advantage of weak or faulty authentication
Directory traversal
Ability to manually move around the structure of that web server into folders & sub-directories
Remote code execution
Take advantage of unpatched systems
XSS
takes advantage of poor input validation
Out of bounds write
Write to unauthorized memory areas
When looking at service providers, consider-
ongoing security audits of all providers
When looking at hardware providers, consider-
- Using a small supplier base; tighter control
- Strict control over policies & procedures
- Security should be part of overall design.
When looking at software providers, consider-
Initial installation; digital signature
Updates & patches
Look at source code (someone who has access, has ability to make changes)