Shared Flashcard Set

Details

Chapter 8
application security
75
Computer Science
Graduate
04/02/2014

Additional Computer Science Flashcards

 


 

Cards

Term
What can an attacker accomplish if they take over an application?
Definition
execute commands with the access permissions of the compromised application
Term
gaining ___ tends to be easier through ___ than through traditionally difficult attacks on the OS
Definition
root

application exploits
Term
What is the dominant attack vector today?
Definition
breaking in by taking over applications
Term
what is one of the most widespread vulnerabilities in application programs?
Definition
buffer overflow vulnerabilities
Term
Where do programs store information temporarily?
Definition
in a part of the RAM called buffers.
Term
what is a buffer overflow?
Definition
when an attacker sends a message with more bytes than a programmer had allocated for a buffer, the attacker's information will spill over into other areas of RAM
Term
What is a common type of buffer overflow?
Definition
stack overflow
Term
what does the stack entry's return address do?
Definition
points to the location in RAM that holds the address of the next command to be executed in the suspended program
Term
what is a buffer overflow?
Definition
if the OS writes too much information to the buffer, it will create the buffer overflow which overwrites the return address.
Term
what is microsoft's webserver software?
Definition
internet information server (IIS)
Term
Which is more total work, app or OS hardening? Why
Definition
App. There are so many applications to harden as opposed to a few OS's.
Term
What is the first task in security?
Definition
understand the environment to be protected.
Term
What is the rule of least permissions? Why is this helpful?
Definition
limit permissions to an App/user as much as possible, this includes reducing the number of apps. Only give the minimal resources/permissions possible to reduce attack vectors.
Term
What are the two ways to minimize the number of/attack vectors to applications ?
Definition
1. Minimize main applications. 2. minimize subsidiary applications: these are obscure programs that start when booting the OS or are installed by default
Term
___ versions of applications are usually much safer than the ___ versions
Definition
newer
older
Term
one way to stymie attackers is to disregard input from anyone who hasn't been ___
Definition
authenticated properly
Term
instead of broad access to a computer, application authentication can be specific as possible. Give an example.
Definition
only accepting people on an ACL and giving different people permissions that are relevant only to the application.
Term
___ should always be used between the user and the application
Definition
cryptographic system protections
Term
in regards to security, which is better commercial off the shelf or in house programming? Why?
Definition
commercial off the shelf is better. custom apps aren't built as carefully because there is less security expertise.
Term
what is the basic rule for all applications?
Definition
never trust user input.
Term
what is a login screen bypass attack?
Definition
an attacker enters a URL to a page beyond the login screen once the login screen appears.
Term
what is cross site scripting?
Definition
one user's input can appear on the page of another user.
Term
if input checking isn't done, an attacker may be able to use ___ to enter a string that includes both ___
Definition
SQL injection
the requested info and another SQL query.
Term
what are some common flaws in web based applications
Definition
improper session management
passing invalid parameters
concurrency errors
Term
what is in band SQL
Definition
extracts data directly from the database and displays it in a web broweser
Term
what is out of band sql
Definition
uses malformed statements to extract data through a different application such as email.
Term
what is inferential SQL
Definition
it doesn't extract data, but information ABOUT the database by using malformed SQL statements
Term
what is error based inference?
Definition
used to make assumptions about the underlying database based on error messages received after a query
Term
what is blind SQL injection
Definition
uses a series of SQL statements that produce different responses based on true/false questions or timed responses
Term
what are the popular webserver programs for microsoft and LINUX/UNIX
Definition
Microsoft = Internet Information Server (IIS)

LINUX/UNIX = Apache
Term
what is security through obscurity? does it work?
Definition
creating custom software and attackers will have a difficult time hacking these programs.

no, because most programming languages produce programs that have common security failure modes that are well known
Term
what are the common webserver attacks? Describe them
Definition
website defacement = putting up a hacker produced page instead of the normal page

buffer overflow to launch a command shell = use buffer overflow to get control of the command shell and strong system privileges.
directory traversal attack = typing in specific symbols in the URL to gain access to other directories
Term
what are some codes used in directory traversal attacks
Definition
../
../etc
../etc/passwd
Term
what are some website protections?
Definition
website vulnerability assessment tools
reading website error logs
placing a webserver-specific application proxy server in front of the webserver
Term
what are some website vulnerability assessment tools?
Definition
Nikto
paros
proxy
acunetix
rational AppScann
Whisker
Term
what are some common error messages that may reveal an attack. describe them
Definition
500 = indicate an attacker is trying to send invalid data to the server
404 = an attacker is searching blindly for files on your website
Term
it is critical to control the deployment of new ___
Definition
server side applications
Term
what are the three classes of servers and their security?
Definition
development server = used only for development
testing servers = developers don't have access, only testers
production = development and testers dont have access, only systems administrators. this provides a service to users
Term
what is mobile code
Definition
consists of commands written into a webpage. when it is downloaded the script can execute automatically
Term
what are some types of mobile code? describe them
Definition
java applets = safest because many attack related actions are disabled

active-x = it is powerful and can do almost anything on the client machine. it offers almost no protection against misuse
Scripting languages (VBScript, JavaScript)= easier to use than full programming languages but lack protections of full languages
Term
browsers are vulnerable to malicious links. what are these.
Definition
if a user clicks on it, an attack script in the downloaded page will execute. sometimes the script will activate even if the user doesn't click on it.
Term
what are some other client side attacks
Definition
file reading = a java applet turns the users PC into an unwilling file server
executing a single command = a script attack that allows the attacker to execute any command on the victim PC
redirecting to unwanted pages = script that permanently changes browser setting/computer registry. Or when you make error typing in a URL you are taken to another site.
cookies= small text string that is placed on the client PC and can store data. can be retrieved later.
Term
what are somethings that cookies can do
Definition
track where you have been at a website
relay private information
Term
how do you enhance browser security
Definition
patching and upgrading
change browser configuration
increase privacy/security in options
Term
what dialog box and tab allows you to change your security settings.
Definition
internet options>security.
allows you to change security for internet, intranet, trusted/restricted websites
Term
what is search engine poisoning
Definition
when malware distributors expend effort attempting to place their malware network sites high enough in search results of a search engine to attack victims
Term
what are the two types of malware attacks. describe them.
Definition
fake Antivirus attack: tricks you into thinking your PC is infected and to get you to download a fix. It is actually malware.
Fake Warez/Codec attack: downloading a "free" program that is supposed to be genuine, but is malware.
Term
what are some dangerous content that is filtered in email.
Definition
malicious code in attachment/HTML
Spam
inappropriate content: company prevents sexually/racially based harassment to avoid lawsuit.
extrusion prevention: prevents intellectual property from leaving the corporation.
PII
Term
How much does spam account for email today
Definition
%60-90
Term
what is over filtered email.
Definition
when filtering for spam, a number of legitimate messages are rejected as spam with no warning to sender or receiver
Term
what do email administrators spend most of their time doing?
Definition
antivirus filtering
spam filtering other security issues
Term
relatively few corporations have their employees ___ email for confidentiality, authenticity integrity or replay protections
Definition
encrypt
Term
for SMTP transmission, what must has to be done to ensure end to end encryption
Definition
use transmission encryption
recipient communicates securely with the mail server
Term
for message encryption, what must be done to ensure end to end security? What are some standards for this?
Definition
sender encrypts the message (including the header, body and attachments)
S/MINME AND PGP
Term
how does PGP work?
Definition
it uses circles of trust. If A trusts B and B trusts C, then A trusts C. It is dangerous because of misplaced trust
Term
What converts a persons voice into digital bytes in VoIP
Definition
Codec
Term
what is in each packet that carries digital voice?
Definition

IP header

user datagram protocol(UDP) header

RTP header

and group of voice octets

Term
what is Real Time Protocol (RTP)
Definition
it is used to make up for two of UDPs weaknesses.
The RTP header has a sequence number so the receiver can place voice octets in order.
second, the RTP header contains a time stamp so the receiver's codec plays the sounds in the packet at the right time.
Term
What is the difference between transport and signaling
Definition
transport is the carriage of voice between the two parties
signalling consists of communication to manage the network (dialing a number)
Term
what are SIP and H.323
Definition
VoIP signaling standards. older systems follow H.323, newer systems follow the Session Initiation protocol (SIP)
Term
what is the first aspect of signaling?
Definition
registration: phone contacts a registrar server and presents the user's credentials
Term
what does a SIP proxy server do?
Definition
it will allow an IP telephone to communicate to a soft telephone. It acts as a middleman by checking registration information and sends INVITE messages to the called device. If the called phone sends an OK message, then the SIP communication continues until a session is established.
Term
how do you establish interconnection between VoIP and PSTN
Definition
they use different codecs, transport and signaling systems. Because of this a PSTN gateway is used which translates between the different technologies.
Term
What are some VoIP threats? Describe them.
Definition
eavesdropping: listening to a call without permission
DoS: used against phones, proxy servers, registrar servers, PSTN gateways. It can simply add latency, jitter or reduced bandwidth
Caller Impersonation: claiming to be someone they aren't
Hacking/Malware: hijacking the phone using Malware/Hacking.
Toll Fraud: breaking into a VoIP system to place long distance calls
Spam over IP telephony (SPIT)
Term
what is the first step in creating VoIP security?
Definition
have good basic security
Term
what are some aspects of VoIP security
Definition
authentication
encryption for confidentiality: encrypt both transport traffic and signaling messages
Firewalls
Term
What are some issues with using port based firewalls with VoIP.
what are the signaling ports?
Definition
the issues for port based firewall filtering: firewall must allow traffic on signaling ports.

SIP = Port 5060
H.323 = Ports 1719 and 1720
Term
NAT causes problems for some protocols. How does it effect VoIP?
Definition
NAT IP address and port number translation take a small amount of time that increases latency
Term
what are some problems with Skype?
Definition
uses proprietary software and protocols that haven't been studied by security professionals

is Peer to Peer service that is almost impossible to control at the firewall because the Skype protocol is unknown and changes.

Skype's file transfer mechanism doesn't necessarily work with antivirus.
Term
Many IM systems only use ___ servers. What doe these do?
Definition
presence servers: allows the two parties to locate each other. after location, communication is peer to peer and servers aren't involved
Term
What is an IM relay server?
Definition
all messages pass through this server. can be used to filter inappropriate content
Term
What are some of the TCP/IP supervisory protocols?
Definition
ARP
ICMP
DNS
DHCP
LDAP
RIP
OSPF
BGP
SNMP
Term
why are supervisory protocols favorite targets?
Definition
disruption of supervisory protocols can disrupt the operation of an entire internet
Term
what is the security of Simple Network Management Protocol (SNMP) V.1
Definition
no security at all
Term
what is the security of Simple Network Management Protocol (SNMP)V.3
Definition
individual secrets shared between the manager and each managed device. offers optional confidentiality message integrity time stamps
Supporting users have an ad free experience!