Week 3: Different Attack Types



In Chapter 7, the author covers many attack types, including Injection, Buffer Overflow, Privilege Escalation, Authentication, and Rootkit attacks.

·       An injection attack is when an attacker executes malicious code or an operation in an interpreter, tricking it into executing it. Some examples are SQL Injection and cross-site Scripting.  

·       Buffer Overflow is a type of attack that takes advantage of a software vulnerability by intentionally writing more data to the memory than it can handle, causing the data to spill into another memory location, corrupting the data, and causing the process to crash, crashing the application.

·       Privilege Escalation is when an actor exploits a system vulnerability or human error to gain unauthorized access and elevate their access from low-level to privileged, allowing them to cause damage or steal data.

·       An authentication attack is when an actor exploits a weakness of the authentication system through impersonation, password spraying, or other forms of authentication attack.

·       A rootkit is a type of malware that is designed to maintain persistence and root-level access on a system without being detected. 

Popular posts from this blog

Week1: Introduction and Cloud Computing

Week 12: Tools for Monitoring Network and Blog Wrap-up

Week 3: Migration to the Cloud