Define Privilege Escalation
Using an existing account to gain privileges beyond that account
Examples of privilege escalation attacks (2)
Preventing Privilege Escalation attacks (3)
Cross Site Scripting attack (XSS)
Taking advantage of web browsers and web-based applications use of JavaScript to launch attacks
2 Types of Cross Site Scripting attacks
Define Non-Persistent Cross Site Scripting Attack
Sends a malicious link to a valid, vulnerable web site with malicious JavaScript appended to input fields that will run silently in the background when the user clicks it
Define Persistent Cross Site Scripting Attack
Permanently posting malicious JavaScript on a site that runs every time the page is launched, i.e. via sites that display user messages or forum sites
Difference between Persistent and Non-Persistent Cross Site Scripting Attack
Non-persistent initiated from user’s browser, Persistent is stored on the web-server and runs every time some one accesses the web page
Define Injection Attack
Adding or removing information from a data stream for malicious intent
4 Common Injection Attacks
Define SQL Injection
Capitalizing on poorly designed web sites to extract data from databases via modified SQL statements
Define XML Injection
Appending malformed XML to XML exchanged between devices for malicious intent
Define LDAP Injection
Injecting data to LDAP data exchanges to access information from LDAP database
Define DLL Injection
Attaching a malicious DLL to a valid process so that whenever the valid process is run, the malicious process is also run
Define Pointer/Object Dereference, how and result
Define Directory Traversal attack and specific server type vulnerable to it
Accessing directories on a web server outside of the publicly available directories hosting the web content
Define Buffer Overflow attack
Using one section of memory to overwrite another section of memory causing the application to crash
What causes buffer overflow vulnerabilities?
Poor application programming
Define Race Condition attack
Taking advantage of simultaneously running processes for malicious intent
What is a TOCTOU attack?
Time-Of-Check to Time-Of-Use attack, taking advantage of the timing of the execution of processes for malicious intent, i.e. transferring more money from an account than the available balance due - Race Condition
What vulnerability exists related to application error handling?
Improper error messages might expose valuable system information, such a stack trace dump, that can be used for further malicious activities
Vulnerability exposed by improper input handling?
Improperly or not validating data input by users opens application up to injection attacks
Define replay attack
Gaining information, such as Session IDs, from network traffic and then using that information to create malicious requests
Define Session Replay attack
Attacker is able to pose as an authorized user by obtaining a session id and posing as another valid user or system