Web & Application Attacks Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

What is a database?

An electronic data storage system organized in tables made up of rows and columns.

2
New cards

Why are databases important to society?

They efficiently store, manage, and retrieve lots of information.

3
New cards

What is a web app?

Any application that runs in a web browser rather than as a standalone program.

4
New cards

What does SQL stand for?

Structured Query Language.

5
New cards

What is SQL used for?

To fetch data from a database.

6
New cards

What is a key characteristic of an SQL statement?

It is a long statement that accesses the dictionary.

7
New cards

Name some important SQL keywords.

SELECT, UNION, null, concat(), FROM.

8
New cards

What is an SQL injection attack?

A malicious code placed into an SQL statement that runs on your database, returning results to an unauthorized user.

9
New cards

How are SQL injection attacks typically accomplished?

By abusing user input fields.

10
New cards

How do we defend against SQL injection attacks?

By sanitizing inputs.

11
New cards

What is a cross-site scripting (XSS) attack?

Malicious JavaScript injected directly onto a site.

12
New cards

What are the three main languages that make up most websites?

HTML, CSS, and JavaScript.

13
New cards

What can a cross-site scripting attack accomplish?

It allows an attacker to steal user data, compromise accounts, or redirect users to malicious sites.

14
New cards

What is a session ID?

An identifier that stores information across multiple visits to a website.

15
New cards

What are the three kinds of cross-site scripting?

Reflected XSS, DOM XSS, and Stored XSS.

16
New cards

What characterizes reflected XSS?

It’s used in the immediate response and only your own computer

17
New cards

What characterizes DOM XSS?

It involves changing the URL and occurs on the client side

18
New cards

What characterizes stored XSS?

It is on the server side, stored in the database, and accessible to any site visitor.

19
New cards

How do we defend against cross-site scripting attacks?

By sanitizing inputs.

20
New cards

What is a cross-site request forgery (CSRF) attack?

It abuses a user’s authentication to get them to perform unwanted actions.

21
New cards

How is a CSRF attack typically launched?

By copying the website and creating a fake version of a form to send to the user.

22
New cards

What is an unrestricted file upload vulnerability?

A vulnerability where a website does not check the types of files being uploaded.

23
New cards

Where can files uploaded to a website end up?

In the directory.

24
New cards

How can we prevent unrestricted file upload vulnerabilities?

By only allowing a specific data type or file size to be uploaded.

25
New cards

What is a denial of service (DoS) attack?

An attack overwhelming a server with requests, preventing it from processing genuine requests.

26
New cards

What is the difference between a DoS attack and a DDoS attack?

A DoS attack floods a device from a single source, while a DDoS attack uses multiple sources.

27
New cards

How can you defend against a denial of service attack?

By blocking traffic from unsafe or malicious IP addresses.