Introduction to Hacking: Web Applications

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key concepts in web application hacking, including attack types and hacker methodologies.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Hacker's Mindset

Analyzing software to work with the existing codebase, seeking entry points rather than making them.

2
New cards

Hacker's Documentation

Keeping a record of prior attempts and lessons learned, with attention to detail in logging prior work.

3
New cards

Hacker's Continuous Learning

Constantly learning and adapting as techniques evolve and defenses improve.

4
New cards

Cross-Site Scripting (XSS)

Uploading malicious script code onto a website to steal data or perform mischief.

5
New cards

Three Main Categories of XSS Attacks

Stored, Reflected, and DOM-based.

6
New cards

Cross-Site Request Forgery (CSRF)

Forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.

7
New cards

CSRF Attack Characteristics

Attack often goes unnoticed and can take advantage of a privileged user without their knowledge.

8
New cards

XML External Entity (XXE)

Attack relies on an improperly configured XML parser within an application's code to import external files.

9
New cards

SQL Injection

Web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.

10
New cards

Components of Injection Attacks

SQL injection is the most common, injection attacks have two major components: an interpreter and a payload from a user that is somehow read into the interpreter.

11
New cards

Denial of Service (DoS)

Attack that bombards the server with requests, paralyzing the server and preventing legitimate visitors from gaining access.

12
New cards

Forms of DoS Attacks

Distributed, Code-level (regex DoS/ReDos), and Severity Levels.

13
New cards

Exploiting Third-Party Dependencies

Reliance on open-source software (OSS) as third-party dependencies can pose a significant security risk.

14
New cards

Risks of Reliance on OSS

OSS codebases may not be audited to the same lengths as your own code and are constantly being updated, requiring security assessment.