Sec+ Domain 1.3 Application attacks

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

Given a scenario, analyze potential indicators associated with application attacks

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Privilege escalation

The process of gaining higher-level access privileges than authorized, often through exploiting vulnerabilities.

2
New cards

Cross-site scripting (XSS)

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

Occur when an attacker uses a web application to send malicious code to a different end user.

Client-side vulnerability: The code is stored on the targeted website

3
New cards

Injections

Attacks where malicious code is inserted into input fields or data streams to manipulate the behavior of an application. Best defense is filter, validate, and sanitize user input.

4
New cards

SQL Injection

Use unexpected input to a web application to gain unauthorized access to an underlying database.

“OR 1=1;” is always true for a database

5
New cards

Dynamic-link library (DLL) Injection

malware tries to inject code into the memory process space of a library using a vulnerable/compromised DLL

6
New cards

Lightweight Directory Access Protocol (LDAP) Injection

When LDAP directories are used for website authentication purposes, threat actors can inject malicious code into user input fields.

Targets directories, not databases

7
New cards

Extensible Markup Language (XML) Injection

occurs when user-supplied input is not properly escaped or sanitized before being added to a web application’s XML documents

8
New cards

Pointer/object dereference

occur when a program attempts to access or manipulate data through a pointer, but due to sloppy programming or lack of proper validation, the pointer leads to unintended memory locations

9
New cards

Directory traversal

also known as path traversal attacks or ../ (dot dot slash) attacks, occur when an attacker gains unauthorized access to files or directories stored outside the web server's root directory.

10
New cards

Buffer overflows

11
New cards

Race conditions

12
New cards

Time of check/time of use

13
New cards
14
New cards
15
New cards
16
New cards
17
New cards
18
New cards
19
New cards
20
New cards
21
New cards
22
New cards
23
New cards
24
New cards
25
New cards
26
New cards
27
New cards
28
New cards