ActiveX
a set of rules for how applications under the Microsoft Windows operating system should share information.
ActiveX control
a specific way of implementing ActiveX that runs through the web browser and functions like a miniature application
add-on
program that provides additional functionality to web browsers. also called EXTENSION
add-ons can:
Address Resolution Protocol (ARP)
part of the TCP/IP protocol for determining the MAC address based on the IP address
-if the IP address for a device is known but the MAC address is not, the sending computer sends an ARP packet to all computers on the network that in effect says, “If this is your IP address, send me back your MAC address.” The computer with that IP address sends back a packet with the MAC address so the packet can be stored in ARP cache for future reference. In addition, all other computers that hear the ARP reply also cache that data
arbitrary/remote code execution
an attack that allows an attacker to run programs and execute commands on a different computer
p109
ARP poisoning
an attack that corrupts the ARP cache
Example of ARP poisoning:
Attack: Steal data
Description: attacker can substitute her own MAC address and steal data intended for another device
Attack: Prevent internet access
Description: attacker can substitute an invalid MAC address for the network gateway so that no users can access external networks
Attack: Man-in-the-middle
Description: man-in-the middle device can be set to receive all communications by substituting that MAC address
Attack: Dos attack
Description: the valid IP address of the DoS target can be substituted with an invalid MAC address, causing all traffic destined for the target to fail
p114
attachment
a file that coupled to an email message and often carries malware
buffer overflow attack
an attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer
client-side attack
an attack that targets vulnerabilities in client applications that interact with a compromised server or process malicious data
command injection
injecting and executing commands to execute on a server
pg100
cookie
a file on a local computer in which a web server stores user-specific information
Several different types of cookies exist:
-cookies can pose both security and privacy risks. FIRST-PARTY COOKIES can be stolen and used to impersonate the user. THIRD-PARTY COOKIES can be used to track the browsing or buying habits of a user. This will allow organizations know which pages are being viewed, how often they are viewed, and the IP address of the viewing computer. This information can be used to infer what items the user may be interested in, and to target advertising to the user
p104
cross-site scripting (XSS)
an attack that injects scripts into a web application server to direct attacks at clients
denial of service (DoS)
an attack that attempts to prevent a system from performing its normal functions by overwhelming the system with requests
3 different types of DoS attacks:
directory traversal
an attack that takes advantage of a vulnerability so that a user can move from the root directory to restricted directories
-once the attacker has accessed a restricted directory, she can enter (inject) commands to execute on a server (called COMMAND INJECTION) or view confidential files
distributed denial of service (DDoS)
an attack that uses many computers to perform a DoS attack
-this is to overwhelm a network
DNS poisoning
an attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker’s device
-predecessor to today’s Internet was a network known as ARPAnet. Network was completed in 1969 and linked together single computers located at each of four different sites. was trying to type the word LOGIN, but failed at letter G. the system crashed
Domain Name System (DNS)
a hierarchical name system for translating domain names to IP addresses
-When TCP/IP was developed, the host table concept was expanded to hierarchical name system for matching computer names and numbers known as DOMAIN NAME SYSTEM
extension
another name for ADD-ON
-add-ons/extensions can do the following:
create additional web browser toolbars
change browser menus
be aware of other tabs open in the same browser process
process the content of every webpage that is loaded
first-party cookie
a cookie that is created from the website currently being viewed
-example:
When viewing the website www.cengage.com, the cookie CENGAGE could be created and saved on the user’s hard drive. Whenever the user returns to this site, that cookie would be used by the site to view the user’s preferences and better customize the browsing experience
Flash cookie
another name for LOCALLY SHARED OBJECT (LSO)
a list of the mappings of host names to IP addresses
host table
-created in the early 1970s
part of HTTP that is comprised of fields that contain the different characteristics of the data that is being transmitted
HTTP header
This is comprised of:
p102
modifying HTTP headers to create an attack
HTTP header manipulation
-not an actual attack, but rather the vehicle through which other attacks, such as XSS, can be launched
Examples of HTTP header attacks:
-REFERER-
some websites check the Referer field to ensure that the request came from a page generated by that site, an attacker can bypass this security by modifying the Referer field to hide the fact that it came from another site
-Accept-Language-
some web applications pass the contents of this field directly to the database. An attacker can inject an SQL command by modifying this header. an attacker could generate a directory traversal attack
-Respnonse splitting-
client computer must allow input that contains CARRIAGE RETURN (CR using %0d or \r) and line feed (LF using %0a, or \a). these characters can not only give attackers control of the remaining HTTP headers and body of the response but also allow them to create additional responoses via HTTP headers that are entirely under their control
p103
an attack that is the result of an attacker changing the value of a variable to something outside the range that the programmer had intended
integer overflow attack
-when this integer overflow occurs, the interpreted value then wraps around from the maximum value to the minimum value
The attack used in situations-
-used to create a buffer overflow situations. if introduced during the calculations for the length of a buffer when a copy is occurring, it could result in a buffer that is too small to hold the data. attack could then use this to create her buffer overflow attack