Test Today on
Chapter 2
Client-Side Attacks cont'd
- Session hijacking
- Attacker attempts to impersonate user by stealing or guessing session token
- Malicious addons
- Browser extensions provide multimedia or interactive Web content
- Active X addons have several security concerns
More after the Break!
- Buffer overflow attacks
- Process attempts to store data in RAM beyond boundaries of fixed-length storage buffer
- Data overflows into adjacent memory locations
- May cause computer to stop functioning
- Attacker can change "return address"
- Redirects to memory address containing malware code
- Normal process:
- Program instructions
- Buffer storing interger data
- Buffer storing character data
- Return address pointer
- Jump back to start
- Buffer overflow process (corrupted)
- Program instructions
- Buffer storing interger data
- Buffer storing character data [Malware]
- [Fill and overflow buffer]
- Return address pointer [New pointer]
- Jump back to Malware
No comments:
Post a Comment