web application attacks, host security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Open web application security project (OWASP)

maintains a top ten list of common web security issues

2
New cards

injection flaws

unwanted transaction code is inserted

most common is SQL injection

3
New cards

request forgery

tricks servers into requesting URLs

4
New cards

SQL injection

an attack in which malicious code is inserted into strings that are later passed to an instance of the SQL Server Database Engine for parsing and execution.

5
New cards

protecting against SQL injections

  • input validation- protects against unsafe user input by checking it on the server before executing commands

  • parameterized SQL- precompiles SQL code on the database server to prevent user input from altering query structure

6
New cards

cross site scripting (XSS)

occur when an attacker embeds malicious scripts in a third party website that are later run by innocent visitors to that site

  • exploits HTML

7
New cards

cross site request forgery (CSRF, XSRF, ‘sea surf’)

leverages the fact that users often log in to multiple sites at the same time and use on site to trick the browser into sending malicious requests to another site without the user’s knowledge

  • often uses fake image tags

  • client side attack

8
New cards

defending against CSRF

  • rearchitect web applications

  • prevent use of HTTP GET requests

  • advise users to log out of sites

  • automatically log out users after an idle period

9
New cards

server side request forgery (SSRF)

request forgery attack that targets servers, rather than users, by manipulating servers into retrieving malicious data from what they believe to be a trusted source

10
New cards

directory traversal attack

when an attacker uses directory navigation references to search for unsecured files on a server

can be prevented by

  • using input validitation to prevent the inclusion of periods in user requests

  • setting strict file system access controls

11
New cards

buffer overflow

use input larger than the buffer

12
New cards

cookies

data stored by websites in user browsers, particularly useful to recognize users, and are used to remember information

13
New cards

session hijacking

attackers steal a web user’s active session by acquiring their unique session ID. This lets them impersonate the user, accessing data or performing actions as if they were the legitimate user. The breach disrupts the session and poses significant risks to personal and organizational data security.

14
New cards

code execution attacks

occurs when an attacker exploits a vulnerability in a system that allows the attacker to run commands on that system

  • arbitrary- code execution attacks where the attacker runs commands of his or her choice

  • remote- code execution attacks that take place over a network connection

  • objectives could be installing malicious code, adding system to botnet, stealing info, or creating accounts for later access

15
New cards

signature detection

antivirus software method that watches for known patterns of malware activity

16
New cards

behavior detection

watches for deviations from normal patterns of activity

17
New cards

Endpoint Detection and Response (EDR)

offers real time, advanced protection

18
New cards

application control 2 main approaches

whitelisting- admin creates a list of all applications that may run on a system

blacklisting- admins create a list of applications that are prohibited on a system

19
New cards

host software baselining

identifies expected system software

20
New cards

default deny rule

firewalls, by default, block any network connection attempts that are not explicitly allowed by a firewall rule

21
New cards

network firewalls

hardware devices that regulate connections between two networks

22
New cards

host firewalls

software components of an operating system that limit connections to a server

23
New cards

next generation firewalls (NGFW)

inorporate advanced security features such as contextual information about the user and application

24
New cards

IDS and IPS

IDS- alert admins to sus network activtiy

IPS- take proactive measures to block suspicious network activity

25
New cards

file integrity monitoring systems

watches for unexpected file modifications

  • uses hash functions (one way functions that transform a variable length input into a unique fixed length output)

26
New cards

data loss prevention

technology solutions that search systems and monitor networks for sensitive information that is unsecured and provide the ability to remove the information, block the transmission, or encrypt the stored data

-host based DLP- uses software agents installed on a single system

-network based DLP- scans network transmissions for sensitive info

2 mechanisms of action:

-pattern matching- recognizes known patterns of sensitive info, such as SSNs

-watermarking-identifies sensitive info using electronic tags

27
New cards

user and entitiy behavior analytics (UEBA)

compares user activity to individual baselines

28
New cards

What command is used to apply operating system updates on some Linux distributions?

upgrade

29
New cards

file integrity monitoring tool

Tripwire