click below
click below
Normal Size Small Size show me how
Chap3
| Term | Definition |
|---|---|
| ActiveX | A set of rules for how applications under windows os should share info |
| ActiveX Control | A specific way of implementing ActiveX that runs through the web browser and functions like a mini application |
| add-on | program that provides additional functionality to a web browsers |
| Address Resolution Protocol | Part of the TCP/IP protocol for determining the MAC address based on the IP address |
| arbitrary/remote code execution | an attack that allows an attacker to run programs and execute commands on a different computer |
| ARP poisioning | Attack that corrupts the arp cache |
| Attachment | a file included in an email that contains malicious software |
| Buffer overflow attack | attack where the process tries to store data in ram beyond the fixed boundaries if the fixed-length storage buffer |
| client-side attack | an attack that targets vulnerabilities in client applications that interact with a compromised server or process malicious data |
| Command injection | injecting and executing commands to execute on a server |
| Cookie | fine on the local computer that stores user specific data |
| Cross-site scripting | attack that injects script into a web application server to direct attacks at clients |
| DOS | attack that tries to stop a system from performing its normal functions by overwhelming the system with requests |
| directory travercial | attack that takes advantage of a vulnerability so that a user can move from the root directory to restricted directories |
| DDoS | attack that uses many computers to perform a dos attack |
| DNS Poisioning | attack that substitutes dns addresses to automatically redirect a computer to an attacker's device |
| DNS | a hierarchical name system for translating domain names to IP addresses |
| extension | an addon |
| first-party cokie | cookie created by the current website being used |
| Flash cookie | a locally shared object |
| host table | a list of the mappings of host names to IP addresses |
| HTTP header | Part of HTTP that is comprised of fields that contain the different characteristics of the data that is being transmitted |
| HTTP header manipulation | Modifying the HTTP header to create an attack |
| integer overflow attack | attack where the attacker changes the value of a variable to something outside the range that the programmer intended |
| LSO | cookie that is significantly different in size and locations from regular cookies and can store more complex info |
| Man-in-the-middle | attack that intercepts real communications and forges a fake response to the sender |
| persistent cookie | cookie that is recorded on the hard drive of the computer and does not expire when the browser closes |
| ping | utility that sends an ICMP echo request message to a host |
| ping flood | attack that uses ICMP to flood a victim with packets |
| plug-in | third-party library that attaches to a web browser and can be embedded inside of a web page |
| privilege escalation | attack that exploits a vulnerability in software to gain access to resources that the user normally would be restricted from accessing |
| replay | attack that makes a copy of the transmission before sending it to the recipient |
| session cookie | a cookie that is stored in ram instead of on the hard drive and only lasts the duration of a visit to a website |
| session hijacking | attack where an attacker attempts to impersonate the user by using the user's session token |
| session token | a form of verification used when accessing a secure web app |
| smurf attack | attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim |
| spoofing | impersonateing another computer or device |
| sql injection | Attack that targets SQL servers by injecting commands to be manipulated |
| SYN flood attack | an attack that takes advantage of the procedures for initiating a TCP/IP session |
| third-Party cookie | a cookie that was created by a third party that is different from the primary website |
| transitive access | attack that exploits the trust relationship between three parties |
| XML | A markup language designed to carry data in contrast to html which indicates how to display data |
| XML injection | Attack that injects XML tags and data into a database |
| Zero-Day attack | attack that exploits previously unknown vulnerabilities, so victims have no time to prepare for or defend against the attack |