Application & Memory-Based Attacks Flashcards

(9 cards)

1
Q

Finding Malware

A

Finding malware → malware often runs in system memory rather than on disk, so memory forensics analyzes active processes, dynamic link libraries, threads, buffers, and other in-memory artifacts to detect malicious code that may evade traditional file-based scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Memory Injection Attacks

A

Memory injection attacks → attacks where malicious code is inserted directly into the memory of a running process, allowing the attacker to execute code without writing files to disk and making detection more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DLL Injection

A

Dynamic link library injection (DLL injection) → memory injection technique where an attacker forces a running process to load a malicious dynamic link library, causing the malicious code to execute within the context of a trusted process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Buffer Overflow Attack

A

Buffer overflow attack → attack that occurs when a program writes more data to a memory buffer than it can handle, causing excess data to overwrite adjacent memory and potentially allowing attackers to execute arbitrary code or crash the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bounds Checking

A

Bounds checking → security practice that ensures data written to memory stays within allocated limits, preventing buffer overflow attacks by rejecting or safely handling oversized input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Race Condition

A

Race condition → vulnerability that occurs when the outcome of a process depends on the timing or order of events, allowing attackers to manipulate execution flow by triggering actions at precisely the right moment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOCTOU

A

Time-of-check to time-of-use (TOCTOU) → race condition where a system checks a resource’s state and then uses it later, allowing attackers to change the resource between the check and the use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malicious Updates

A

Malicious updates → attack technique where attackers distribute compromised software updates, emphasizing the need to verify update sources, download directly from developers, and treat every installation as potentially malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Automatic Updates

A

Automatic updates → update mechanism that installs patches without user intervention, improving security by reducing exposure time but still requiring trusted sources and integrity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly