click below
click below
Normal Size Small Size show me how
Chap3
Term | Definition |
---|---|
ActiveX | A set of rules for how applications under windows os should share info |
ActiveX Control | A specific way of implementing ActiveX that runs through the web browser and functions like a mini application |
add-on | program that provides additional functionality to a web browsers |
Address Resolution Protocol | Part of the TCP/IP protocol for determining the MAC address based on the IP address |
arbitrary/remote code execution | an attack that allows an attacker to run programs and execute commands on a different computer |
ARP poisioning | Attack that corrupts the arp cache |
Attachment | a file included in an email that contains malicious software |
Buffer overflow attack | attack where the process tries to store data in ram beyond the fixed boundaries if the fixed-length storage buffer |
client-side attack | an attack that targets vulnerabilities in client applications that interact with a compromised server or process malicious data |
Command injection | injecting and executing commands to execute on a server |
Cookie | fine on the local computer that stores user specific data |
Cross-site scripting | attack that injects script into a web application server to direct attacks at clients |
DOS | attack that tries to stop a system from performing its normal functions by overwhelming the system with requests |
directory travercial | attack that takes advantage of a vulnerability so that a user can move from the root directory to restricted directories |
DDoS | attack that uses many computers to perform a dos attack |
DNS Poisioning | attack that substitutes dns addresses to automatically redirect a computer to an attacker's device |
DNS | a hierarchical name system for translating domain names to IP addresses |
extension | an addon |
first-party cokie | cookie created by the current website being used |
Flash cookie | a locally shared object |
host table | a list of the mappings of host names to IP addresses |
HTTP header | Part of HTTP that is comprised of fields that contain the different characteristics of the data that is being transmitted |
HTTP header manipulation | Modifying the HTTP header to create an attack |
integer overflow attack | attack where the attacker changes the value of a variable to something outside the range that the programmer intended |
LSO | cookie that is significantly different in size and locations from regular cookies and can store more complex info |
Man-in-the-middle | attack that intercepts real communications and forges a fake response to the sender |
persistent cookie | cookie that is recorded on the hard drive of the computer and does not expire when the browser closes |
ping | utility that sends an ICMP echo request message to a host |
ping flood | attack that uses ICMP to flood a victim with packets |
plug-in | third-party library that attaches to a web browser and can be embedded inside of a web page |
privilege escalation | attack that exploits a vulnerability in software to gain access to resources that the user normally would be restricted from accessing |
replay | attack that makes a copy of the transmission before sending it to the recipient |
session cookie | a cookie that is stored in ram instead of on the hard drive and only lasts the duration of a visit to a website |
session hijacking | attack where an attacker attempts to impersonate the user by using the user's session token |
session token | a form of verification used when accessing a secure web app |
smurf attack | attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim |
spoofing | impersonateing another computer or device |
sql injection | Attack that targets SQL servers by injecting commands to be manipulated |
SYN flood attack | an attack that takes advantage of the procedures for initiating a TCP/IP session |
third-Party cookie | a cookie that was created by a third party that is different from the primary website |
transitive access | attack that exploits the trust relationship between three parties |
XML | A markup language designed to carry data in contrast to html which indicates how to display data |
XML injection | Attack that injects XML tags and data into a database |
Zero-Day attack | attack that exploits previously unknown vulnerabilities, so victims have no time to prepare for or defend against the attack |