Back to notes
What is the advantage of using character escapes like '<' for mitigating XSS attacks?
Press to flip
Using character escapes like '<' ensures that potentially dangerous characters are not executed as code by the browser, thus preventing the execution of malicious scripts injected via XSS attacks.
Why might open source software be more secure than closed source software?
Open source software can be more secure because its source code is publicly visible, allowing a large community to inspect, identify, and fix vulnerabilities more quickly. However, it also means that potential attackers can view the source code.
What are package managers and why should packages be signed and verified?
Package managers like pip, gem, and npm automate the process of installing, upgrading, configuring, and managing software packages. Signing and verifying packages ensure that the packages are legitimate and have not been altered maliciously.
How do Bug Bounty programs enhance software security?
Bug Bounty programs incentivize ethical hackers to find and report security vulnerabilities by offering rewards. This proactive approach helps organizations discover and fix vulnerabilities before malicious entities can exploit them.
Describe how Command Injection attacks occur and a best practice to avoid them.
Command Injection attacks occur when an application passes unsafe user-supplied input to a system shell. To avoid them, refrain from using unsafe functions like `system()` and `eval()`, instead use safer alternatives or thoroughly validate and sanitize inputs.
What is a CSRF token and how does it prevent CSRF attacks?
A CSRF token is a unique, secret value included in requests to validate that the request is intentionally made by the authenticated user. It prevents CSRF attacks by ensuring that a malicious site cannot perform actions on behalf of a user without knowing the token.
What is the purpose of Common Vulnerabilities and Exposures (CVE)?
CVE provides a reference-method for publicly known cybersecurity vulnerabilities, aiding organizations in identifying specific vulnerabilities and standardizing the way vulnerabilities are identified and discussed.
What is the Common Vulnerability Scoring System (CVSS)?
CVSS is a standardized way to capture the principal characteristics of a vulnerability and produce a numerical score, reflecting its severity. This helps organizations prioritize vulnerability management and response.
How can SQL Injection attacks be mitigated?
SQL Injection attacks can be mitigated by using prepared statements and parameterized queries, which ensure user input is treated safely without directly executing it as part of an SQL command.
Explain the concept of the Exploit Prediction Scoring System (EPSS).
EPSS aims to estimate the likelihood that a vulnerability will be exploited in the wild within a certain timeframe, aiding organizations in prioritizing and addressing vulnerabilities based on their potential risk.
What is phishing and how can victims identify phishing attempts?
Phishing is a method of attempting to acquire sensitive information by masquerading as a trustworthy entity. Victims can identify phishing by checking URLs before clicking, being wary of emails requesting sensitive information, and noticing discrepancies in the sender's address or the link's domain.
Why is it important to verify software with digital signatures?
Digital signatures ensure the integrity and authenticity of software by using cryptographic techniques to provide proof that the software has not been tampered with and is from a trusted source.
What are the differences between GET and POST requests?
GET requests include all necessary information in the URL and are used for retrieving data, while POST requests send data in the body of the request and are used for creating or updating resources, making them more secure for sensitive operations.
Explain Cross Site Scripting (XSS) and provide an example.
Cross Site Scripting (XSS) is an attack where malicious scripts are injected into otherwise benign and trusted websites. For example, an attacker might insert a `<script>` tag within a user comment field that executes when viewed, such as `<script>alert('attack')</script>`.
What are reflected and stored XSS attacks?
Reflected XSS attacks involve malicious scripts being reflected off a web server, such as through a URL parameter, and executed immediately. Stored XSS attacks occur when malicious input is stored on the target server, like in a database, and executed later when the data is retrieved and displayed.
Previous
Next