• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
Cross-site scripting
one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications.
If you use SQL queries in security controls such as authentication, what will happen?
attackers could alter the logic of those queries to bypass security. They could modify the queries to steal, corrupt, or otherwise change your underlying data.
Buffer overflows
are Mother Nature's little reminder of that law of physics that says: if you try to put more stuff into a container than it can hold, you're going to make a mess. The scourge of C applications for decades, buffer overflows have been remarkably resistant to elimination.
CSRF
Cross-Site Request Forgery
If you don't ensure that your software's users are only doing what they're allowed to, what will happen?
attackers will try to exploit your improper authorization and exercise unauthorized functionality that you only intended for restricted users.
When can trouble occur?
Software developers often rely on untrusted inputs in the same way, and when these inputs are used to decide whether to grant access to restricted resources
What is the topic discussed in topic #7?
Improper Limitation of a Pathname to a Restricted Directory
What is the topic discussed in topic #8?
Unrestricted Upload of File with Dangerous Type
What is the topic discussed in topic #9?
Improper Sanitization of Special Elements used in an OS Command
What is the topic discussed in topic #10?
Missing Encryption of Sensitive Data
Hard-coding
If the password is the same across all your software, then every customer becomes vulnerable if (rather, when) your password becomes known. Because it's hard-coded, it's usually a huge pain for sysadmins to fix.
A popular insult
Take a long walk off a short pier
What is the topic discussed in topic #13?
Improper Control of Filename for Include/Require Statement in PHP Program
What is the topic discussed in topic #14?
Improper Validation of Array Index
What is the topic discussed in topic #15?
Improper Check for Unusual or Exceptional Conditions
What is the topic discussed in topic #16?
Information Exposure Through an Error Message
What is 255+1 in a computer program?
255+1=0, or 0-1=65535, or maybe 40,000+40,000=14464.
What can be samples of opportunities for error?
If the programmer does not properly calculate the size of a buffer, then the buffer may be too small to contain the data that the programmer plans to write - even if the input was properly validated. Any number of problems could produce the incorrect calculation, but when all is said and done, you're going to run head-first into the dreaded buffer overflow.
What is the topic discussed in topic #19?
Missing Authentication for Critical Function
What is the topic discussed in topic #20?
Download of Code Without Integrity Check
Who can be this impolite users?
attackers
lack of control over resource allocation
is an avenue for attackers to cause a denial of service against other users of your software, possibly the entire system - and in some cases, this can be leveraged to conduct other more devastating attacks.
What is the topic discussed in topic #23?
URL Redirection to Untrusted Site
What is the topic discussed in topic #24?
Use of a Broken or Risky Cryptographic Algorithm
race condition
can involve multiple processes in which the attacker has full control over one process. Even when the race condition occurs between multiple threads, the attacker may be able to influence when some of those threads execute. Your only comfort with race conditions is that data corruption and denial of service are the norm.