CS-3310 - 05 Security - Authentication and Exploits

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

26 Terms

1
New cards

What is the Lamport hash chain?

Sequence of hashed passwords.

2
New cards

What is challenge-response authentication?

Response using secret + challenge.

3
New cards

What is two-factor authentication?

Two independent auth factors.

4
New cards

What is biometric authentication?

Using physical traits.

5
New cards

Give examples of biometric methods.

Fingerprint, iris, voice, signature.

6
New cards

What is a side-channel attack?

Extracting secrets via analysis.

7
New cards

What is a buffer overflow attack?

Overwriting memory via overflow.

8
New cards

What is shellcode?

Malicious injected machine code.

9
New cards

What is a NOP sled?

Buffer guiding execution to shellcode.

10
New cards

What are stack canaries?

Values detecting stack corruption.

11
New cards

What is DEP or the NX bit?

Prevents executing data memory.

12
New cards

What is Address Space Layout Randomization (ASLR)?

Randomized memory layout.

13
New cards

What is return-oriented programming (ROP)?

Chaining code gadgets.

14
New cards

What is a non-control-flow-diverting attack?

Changing data, not execution.

15
New cards

What is a format string attack?

Using printf to write memory.

16
New cards

What is a dangling pointer attack?

Using freed memory maliciously.

17
New cards

What is a null pointer dereference exploit?

Mapping page 0 to run code.

18
New cards

What is an integer overflow attack?

Numeric wraparound exploit.

19
New cards

What is a command injection attack?

Injecting OS commands.

20
New cards

What is a TOCTOU attack?

Time-of-check/time-of-use race.

21
New cards

What are insider attacks?

Attacks by trusted users.

22
New cards

What is a logic bomb?

Malicious conditional trigger.

23
New cards

What is a backdoor?

Secret bypass into a system.

24
New cards

What is login spoofing?

Fake login capturing credentials.

25
New cards

What is a rootkit?

Stealthy privilege-hiding malware.

26
New cards

What is spyware?

Software secretly monitoring users.