Privileges to access hardware and software resources
XML injection attack
·
attacker discovers a
website that does not filter user data and injects XML tags and data into the
database
XPath injection
·
a specific type of XML
injection attack that attempts to exploit XML Path Language queries that are
built from user input
directory traversal
attack
·
attacker moves from
root directory to restricted directories
command injection
attack
·
attacker enters
commands to execute on a server
drive-by download
·
client computer is
compromised simply by viewing a web page
drive-by download
·
client computer is
compromised simply by viewing a web page
cookies
·
store user-specific
information on a user's local computer
first-party cookie
·
cookie created by
website user is currently viewing
third-party cookie
·
site advertisers place
a cookie to record user preferences
session cookie
·
stored in RAM and
expires when browser is closed
persistent cookie
(a.k.a. tracking cookie)
·
recorded on computer's
hard drive and does not expire when the browser closes
locally shared object
(LSO)
·
can store up to 100 KB
of data from a website and is more complex than the simple text found in a
regular cookie
session hijacking
·
attacker attempts to
impersonate user by stealing or guessing session token
session token
·
a random string
assigned to an interaction between user and web application
impartial overflow
attacks
·
attacks designed to
overflow areas of memory with instructions from the attacker
buffer overflow
attacks
·
occurs when a process
attempts to store data in RAM beyond the boundaries of a fixed-length storage
buffer, when a return address is used after a process interruption
integer overflow
attack
·
when an attacker
changes the value of a variable to something outside the range that the
programmer had intended
zero-day attack
·
an attack that
exploits previously unknown vulnerabilities, and victims have no time to
prepare for or defend against the attack
Cross-Site Scripting
(XSS) attacks
·
designed to steal
information that requires a website to accept user input without validating it
and to use input in a response
SQL injection
·
an attack that targets
SQL servers by injecting malicious commands into them
arbitrary/remote code
execution attack
·
an attack that allows
an attacker to run programs and execute commands on a different computer and
usually involves a heap spray that inserts data only in parts of memory
network-based attack
·
any attack that
exploits a single vulnerability that may expose hundreds or thousands of
devices to an attacker
denial of service
·
a deliberate attempt
to prevent authorized users from accessing a system by overwhelming it with
requests
distributed denial of
service
·
using hundreds or
thousands of zombie computers in a botnet to flood a device with requests
ping flood attack
·
the ping utility is
used to send large number ICMP echo request messages
smurf attack
·
tricks devices into
responding to false requests to an unsuspecting victim by spoofing
spoofing
·
an attacker broadcasts
a ping request to all computers on the network but changes the address from
which the request came from
SYN flood attack
·
an attack that takes
advantage of procedures for initiating a session
man-in-the-middle
attack
·
interception of
legitimate communication and forging a fictitious response to the sender
replay attacks
·
when an attacker makes
a copy of a transmission before sending it to the original recipient
poisoning
·
the act of introducing
a substance that harms or destroys
ARP poisoning
·
attacker modifies MAC
address in ARP cache to point to a different computer
DNS poisoning
·
substitutes DNS
addresses to redirect a computer to another device
access rights
·
privileges to access
hardware and software resources that are granted to users
privilege escalation
·
exploiting a software vulnerability
to gain access to resources that the user normally would be restricted from
accessing
transitive access
·
an attack involving a
third party to gain access rights