• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back

Buffer Overflow

Heap grows to overwrite the return address of a program. Return address may be overwritten to return to malicious code.

Canary

Random value placed between the local variables and the return address. If the Canary is modified, the program is stopped.

Heap Spraying

Write over heap with target address. Hope that the victim uses an overwritten function pointer before program crashes.

SQL Injection

User provides a substring for a SQL query that changes the query entirely.

Name Resolution

Use of a name label to obtain access to system resources

Name Server

Performs name resolution using names pace bindings(e.g. directory) to convert a name (e.g. filename) into a resource (e.g.)

Improper Resource Attack

Adversary controls final resource in unexpected ways.Victim expects high integrity, gets low integrity instead.

Improper Binding Attack

Adversary controls binding to redirect victim to a resource not under adversary ' control. Victim expects low integrity/secrecy, gets high integrity instead.

Race Conditions

Adversary exploits non-atomicity in "check" and "use" of resource to conduct improper Resource and improper Binding attacks