Injection Attacks – Security of Mobile and Web-based Applications (SoSe 2025)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering major terms and definitions related to injection attacks, XSS, SQLi, defenses, tools, and architectural concepts discussed in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Injection Attack

A vulnerability category where untrusted input is inserted into a command or query, altering its execution and enabling malicious behavior.

2
New cards

Von Neumann Architecture

CPU design where data and instructions share the same memory; flexible but memory bus becomes a bottleneck.

3
New cards

Harvard Architecture

CPU design that separates instruction and data memories, yielding speed and security benefits; common in microcontrollers.

4
New cards

Cross-Site Scripting (XSS)

An injection attack where malicious JavaScript is executed in a victim’s browser via crafted HTML content.

5
New cards

Reflected XSS (Type 1)

Non-persistent XSS where malicious input is immediately reflected by the server in its response.

6
New cards

Stored XSS (Type 2)

Persistent XSS where malicious input is stored on the server (e.g., DB) and served to many users later.

7
New cards

DOM-Based XSS (Type 0)

Client-side XSS where the browser’s DOM is modified directly without server involvement.

8
New cards

Content Security Policy (CSP)

HTTP response header that restricts sources of executable scripts, mitigating XSS.

9
New cards

XSStrike

Automated XSS discovery suite featuring payload generation, fuzzing, and crawling.

10
New cards

Session Cookie Theft

XSS payload goal to read document.cookie and send it to an attacker, hijacking user sessions.

11
New cards

SQL Injection (SQLi)

Attack where untrusted input alters an SQL query’s structure, enabling unauthorized data access or modification.

12
New cards

Blind SQL Injection

SQLi where no error or output is shown; attackers infer data via timing, Boolean responses, or resource consumption.

13
New cards

UNION-Based Injection

SQLi technique appending a UNION SELECT to combine attacker-controlled results with the original query output.

14
New cards

Error-Based Injection

SQLi where attackers exploit verbose error messages to glean database structure and data.

15
New cards

Boolean-Based Blind SQLi

Blind SQLi relying on true/false differences in application responses to extract information.

16
New cards

Time-Based Blind SQLi

Blind SQLi where attackers use database delays (e.g., SLEEP) and measure response time to infer data.

17
New cards

Stacked Queries

SQLi method adding a semicolon to run additional commands after the original query.

18
New cards

sqlmap

Open-source tool that automates detection and exploitation of SQL injection vulnerabilities.

19
New cards

mysqlirealescape_string()

PHP function escaping special characters in strings for SQL; protects only quoted string data.

20
New cards

Prepared Statement

Database feature separating query structure from data parameters to prevent SQL injection.

21
New cards

Object-Relational Mapper (ORM)

Library that maps database tables to objects; shields developers from raw SQL but still requires patching for injection flaws.

22
New cards

html vs. JavaScript Context

Security critical distinction between data (display) and code (execution) within web pages.

23
New cards

Escaping

Replacing or encoding special characters to ensure user input is treated as data, not executable code.

24
New cards

Content Length Limiting

Defense that restricts maximum input size, reducing payload room for injection attacks.

25
New cards

Disable Inline Scripts

CSP directive (e.g., script-src 'self') blocking inline JavaScript to mitigate XSS.

26
New cards

iframe Abuse

XSS tactic loading external pages or hidden resources via

27
New cards

Cookie Scope

Attributes (HttpOnly, Secure, SameSite) defining when and how cookies are accessible; HttpOnly hinders JS theft.

28
New cards

SQL Discovery via Errors

Unsanitized error messages reveal schema and query details, aiding attackers.

29
New cards

Log Flooding

Attacker strategy of generating excess errors to hide malicious events in logs.

30
New cards

Intrusion Detection System (IDS)

Security tool monitoring traffic and alerts or blocks upon detecting suspicious activity such as injection patterns.

31
New cards

Prompt Injection (LLM01)

OWASP risk where malicious prompts manipulate Large Language Models to ignore guidelines or leak data.

32
New cards

Direct Prompt Injection

Attacker-supplied instruction directly inserted into LLM input, overriding intended behavior.

33
New cards

Indirect Prompt Injection

Hidden or obfuscated instructions embedded in content that an LLM later processes, causing malicious actions.

34
New cards

Multilingual/Obfuscated Attack

Prompt injection technique using multiple languages, encoding, or emojis to bypass filters.

35
New cards

SQL Confidentiality Impact

Attack goal to read large volumes of sensitive data from the database.

36
New cards

SQL Availability Impact

Injection that exhausts server resources, causing denial of service.

37
New cards

SQL Integrity Impact

Injection altering or deleting data, corrupting the database’s correctness.

38
New cards

XSS Payload Hiding

Use of CSS or invisible elements to conceal malicious scripts from victims.

39
New cards

XSStrike Example Payload

– XSS vector without traditional
40
New cards

Bobby Tables (XKCD 327)

Humorous reference illustrating the consequences of unsanitized SQL input ("Robert'); DROP TABLE Students;--").