Week 3: Different Attack Types
In Chapter 7, the author covers many attack types, including Injection, Buffer Overflow, Privilege Escalation, Authentication, and Rootkit attacks.
·
An injection attack is when an attacker executes
malicious code or an operation in an interpreter, tricking it into executing it.
Some examples are SQL Injection and cross-site Scripting.
·
Buffer Overflow is a type of attack that takes
advantage of a software vulnerability by intentionally writing more data to the
memory than it can handle, causing the data to spill into another memory
location, corrupting the data, and causing the process to crash, crashing the
application.
·
Privilege Escalation is when an actor exploits a
system vulnerability or human error to gain unauthorized access and elevate
their access from low-level to privileged, allowing them to cause damage or steal
data.
·
An authentication attack is when an actor
exploits a weakness of the authentication system through impersonation,
password spraying, or other forms of authentication attack.
·
A rootkit is a type of malware that is designed
to maintain persistence and root-level access on a system without being
detected.