Ethical Hacking Quiz 2

0.0(0)
studied byStudied by 3 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Buffer Overflow (Buffer Overrun)

A condition where more input is placed into a buffer than it can hold, overwriting adjacent memory. Exploited to crash a system or insert malicious code.

2
New cards

Compile-Time Defenses

Security measures implemented when a program is compiled to harden it against attacks.

3
New cards

Runtime Defenses

Security measures that operate during program execution to detect and stop attacks.

4
New cards

Stack Protection Mechanisms

A compile-time defense that adds code to check a function's stack frame for corruption (e.g., Stackguard).

5
New cards

Executable Address Space Protection

A runtime defense that prevents code from executing in memory regions like the stack.

6
New cards

Guard Pages

A runtime defense that places illegal memory pages between data regions; accessing them aborts the process.

7
New cards

Address Space Randomization

A runtime technique that randomizes memory addresses to make it harder for attackers to predict target locations.

8
New cards

File System Access Control

Mechanism that identifies users and enforces permissions on files and operations based on their profile.

9
New cards

Operating System Hardening

The process of securing an OS by patching, configuring, removing unused software, and adding security controls.

10
New cards

Logging

The process of recording system, network, and application events to aid in identifying and investigating security incidents.

11
New cards

Data Backup

The process of copying data at intervals to enable recovery over short periods (hours to weeks).

12
New cards

Data Archive

The process of retaining data copies for extended periods (months/years) for legal or operational needs.

13
New cards

Access Token (Windows)

An object attached to a user's process containing their SID and group SIDs, used to validate access to resources.

14
New cards

Web Application

An application served via the HTTP or HTTPS protocol from a remote server.

15
New cards

Cross-Site Scripting (XSS)

A vulnerability allowing attackers to inject malicious client-side scripts into web pages viewed by others.

16
New cards

Non-Persistent (Reflected) XSS

An XSS attack where injected code is reflected off a web server (e.g., in an error) and delivered via a link.

17
New cards

Persistent (Stored) XSS

An XSS attack where injected code is saved on the server (e.g., in a DB) and executed when users view the infected page.

18
New cards

DOM-Based XSS

An XSS attack where the payload executes by modifying the DOM environment in the victim's browser.

19
New cards

SQL Injection

A server-side vulnerability allowing attackers to inject malicious SQL commands into a database query.

20
New cards

Parameter Tampering

An attack that modifies parameters in a URL or form to gain unauthorized access or subvert application logic.

21
New cards

Command Injection (OS Commanding)

An attack that exploits an application to execute unauthorized operating system commands.

22
New cards

Session Management

The process of tracking a user's activity across interactions with a system, as HTTP is stateless.

23
New cards

Cookie Poisoning

A parameter tampering attack that modifies a cookie's contents to bypass security mechanisms.

24
New cards

Directory Traversal (Path Traversal)

An attack that uses ../ sequences to access files and directories outside the web server's root directory.

25
New cards

Cross-Site Request Forgery (CSRF)

An attack that tricks a victim's browser into making an unauthorized request to a web app where they are authenticated.

26
New cards

Buffer Overflow (Web Context)

An attack where user input exceeds a buffer's capacity, corrupting memory and potentially allowing code execution.