• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
What is Cross-site scripting (XSS)?
Cross-site scripting (XSS) is one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications. It's pretty much inevitable when you combine the stateless nature of HTTP, the mixture of data and script in HTML, lots of data passing between web sites, diverse encoding schemes, and feature-rich web browsers.
What would happen if you use SQL queries in security controls?
attackers could alter the logic of those queries to bypass security. They could modify the queries to steal, corrupt, or otherwise change your underlying data. They'll even steal data one byte at a time if they have to, and they have the patience and know-how to do so.
What is the is the simplest error to make in a time when there are much more interesting mistakes to avoid?
copying an untrusted input without checking the size of that input
What Tester will you use to identify potential issues?
Use OWASP CSRFTester to identify potential issues.
What will you use to enforce the roles at their appropriate boundaries?
Use role-based access control (RBAC)
Give an example of a message authentication code (MAC) algorithm.
Hash Message Authentication Code (HMAC)
What mechanism can remove characters such as '.' and ';' which may be required for some exploits?
A sanitizing mechanism
What is unrestricted file upload?
The "unrestricted file upload" term is used in vulnerability databases and elsewhere, but it is insufficiently precise. The phrase could be interpreted as the lack of restrictions on the size or number of uploaded files, which is a resource consumption issue.
What are the two subtypes of OS command injection?
1) The application intends to execute a single, fixed program that is under its own control.1) The application intends to execute a single, fixed program that is under its own control.

2) The application accepts an input that it uses to fully select which program to run, as well as which commands to use.
What are the two separate needs and contexts for encryption?
1. One-way.This can be achieved using public key cryptography, or other techniques in which the encrypting party does not need to have access to a private key.

2. Two-way. This requires storage of the private key in a format that is recoverable only by the user in a way that cannot be recovered by others.
What are the three solutions possible For front-end to back-end connections?
The first suggestion involves the use of generated passwords or keys that are changed automatically and must be entered at given time intervals by a system administrator.

Next, the passwords or keys should be limited at the back end to only performing actions valid for the front end, as opposed to having full access.

Finally, the messages sent should be tagged and checksummed with time sensitive values so as to prevent replay-style attacks.
What does Address Space Layout Randomization (ASLR) do?
It forces the attacker to guess an unknown value that changes every program execution.
What is Local file inclusion?
This term is frequently used in cases in which remote download is disabled, or when the first part of the filename is not under the attacker's control, which forces use of relative path traversal (CWE-23) attack techniques to access files that may contain previously-injected PHP code, such as web access logs.
What is the most common condition situation leading to unchecked array indexing?
Use of loop index variables as buffer indexes.
What does Murphy's Law says?
Murphy's Law says that anything that can go wrong, will go wrong
What is Confidentiality?
Often this will either reveal sensitive information which may be used for a later attack or private information stored in the server.
What is "Integer overflow"?
"Integer overflow" is sometimes used to cover several types of errors, including signedness errors, or buffer overflows that involve manipulation of integer data types instead of characters.
What is the reason when the programmer does not properly calculate the size of a buffer?
the buffer may be too small to contain the data that the programmer plans to write - even if the input was properly validated.
How will you ensure that all channels are appropriately protected?
Identify all potential communication channels, or other means of interaction with the software
What technique is useful in cases when source code is unavailable, if the software was not developed by you, or if you want to verify that the build phase did not introduce any new weaknesses.
Use monitoring tools that examine the software's process as it interacts with the operating system and the network.
How will you maintain more fine-grained control over your resources?
Divide your application into anonymous, normal, privileged, and administrative areas. Reduce the attack surface by carefully defining distinct user groups, privileges, and/or roles. Map these against data, functionality, and the related resources. Then set the permissions accordingly.
How will you limit the potential for a DoS attack?
Consider tracking the rate of requests received from users and blocking requests that exceed a defined rate threshold.
What are the potential areas where untrusted inputs can enter into a software?
Parameters or arguments, cookies, anything read from the network, environment variables, reverse DNS lookups, query results, request headers, URL components, e-mail, files, databases, and any external systems that provide data to the application.
What are Cryptographic algorithms?
Cryptographic algorithms are the methods by which data is scrambled. T
What can Black box methods do?
Black box methods may be able to identify evidence of race conditions via methods such as multiple simultaneous connections, which may cause the software to become instable or crash.