Privileges to access hardware and software resources

Privileges to access hardware and software resources 


XML injection attack

 

·         attacker discovers a website that does not filter user data and injects XML tags and data into the database

 

XPath injection

 

·         a specific type of XML injection attack that attempts to exploit XML Path Language queries that are built from user input

 

directory traversal attack

 

·         attacker moves from root directory to restricted directories

 

command injection attack

 

·         attacker enters commands to execute on a server

 

drive-by download

 

·         client computer is compromised simply by viewing a web page

 

drive-by download

 

·         client computer is compromised simply by viewing a web page

 

cookies

 

·         store user-specific information on a user's local computer

 

first-party cookie

 

·         cookie created by website user is currently viewing

 

third-party cookie

 

·         site advertisers place a cookie to record user preferences

 

session cookie

 

·         stored in RAM and expires when browser is closed

 

persistent cookie (a.k.a. tracking cookie)

 

·         recorded on computer's hard drive and does not expire when the browser closes

 

locally shared object (LSO)

 

·         can store up to 100 KB of data from a website and is more complex than the simple text found in a regular cookie

 

session hijacking

 

·         attacker attempts to impersonate user by stealing or guessing session token

 

session token

 

·         a random string assigned to an interaction between user and web application

 

impartial overflow attacks

 

·         attacks designed to overflow areas of memory with instructions from the attacker

 

buffer overflow attacks

 

·         occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer, when a return address is used after a process interruption

 

integer overflow attack

 

·         when an attacker changes the value of a variable to something outside the range that the programmer had intended

 

zero-day attack

 

·         an attack that exploits previously unknown vulnerabilities, and victims have no time to prepare for or defend against the attack

 

Cross-Site Scripting (XSS) attacks

 

·         designed to steal information that requires a website to accept user input without validating it and to use input in a response

 

SQL injection

 

·         an attack that targets SQL servers by injecting malicious commands into them

 

arbitrary/remote code execution attack

 

·         an attack that allows an attacker to run programs and execute commands on a different computer and usually involves a heap spray that inserts data only in parts of memory

 

network-based attack

 

·         any attack that exploits a single vulnerability that may expose hundreds or thousands of devices to an attacker

 

denial of service

 

·         a deliberate attempt to prevent authorized users from accessing a system by overwhelming it with requests

 

distributed denial of service

 

·         using hundreds or thousands of zombie computers in a botnet to flood a device with requests

 

ping flood attack

 

·         the ping utility is used to send large number ICMP echo request messages

 

smurf attack

 

·         tricks devices into responding to false requests to an unsuspecting victim by spoofing

 

spoofing

 

·         an attacker broadcasts a ping request to all computers on the network but changes the address from which the request came from

 

SYN flood attack

 

·         an attack that takes advantage of procedures for initiating a session

 

man-in-the-middle attack

 

·         interception of legitimate communication and forging a fictitious response to the sender

 

replay attacks

 

·         when an attacker makes a copy of a transmission before sending it to the original recipient

 

poisoning

 

·         the act of introducing a substance that harms or destroys

 

ARP poisoning

 

·         attacker modifies MAC address in ARP cache to point to a different computer

 

DNS poisoning

 

·         substitutes DNS addresses to redirect a computer to another device

 

access rights

 

·         privileges to access hardware and software resources that are granted to users

 

privilege escalation

 

·         exploiting a software vulnerability to gain access to resources that the user normally would be restricted from accessing

 

transitive access

 

·         an attack involving a third party to gain access rights

 

Answer Detail

Get This Answer

Invite Tutor