Security Testing III
Flashcard
•
Others
•
University
•
Practice Problem
•
Hard
Vitho Vitho
FREE Resource
Student preview

15 questions
Show all answers
1.
FLASHCARD QUESTION
Front
CWE: Common Weakness Enumeration
Back
The CWE (Common Weakness Enumeration) provides a list of the most common software and hardware weaknesses that can contribute to security vulnerabilities, with each CWE having a unique identifier and being described by several fields. CWEs vary in levels of abstraction and are hierarchically organized, with relationships such as "parent of," "child of," "can follow," and "member of."
2.
FLASHCARD QUESTION
Front
CWE: Top 10/25
Back
These lists highlight the most dangerous software weaknesses across various applications and systems, not limited to a single domain like the web. Each CWE is scored based on its prevalence, measured by how often it is linked to a CVE, its average severity in real-world applications, and the potential damage if exploited. The Top 10 focuses on known exploited vulnerabilities (KEV), while the Top 25 considers broader factors such as the source of information, ease of detection by code scanning tools, ease of exploitation, and the potential impact for adversaries exploiting these weaknesses.
3.
FLASHCARD QUESTION
Front
CWE Top-10 Weaknesses
Back
1. Use-After-Free (CWE-416)
2. Heap-based Buffer Overflow (CWE-122)
3. Out-of-bounds Write (CWE-787)
4. Improper Input Validation (CWE-20)
5. Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection’) (CWE-78)
6. Deserialization of Untrusted Data (CWE-502)
7. Server-Side Request Forgery (SSRF) (CWE-918)
8. Access of Resource Using Incompatible Type ('Type Confusion’) (CWE-843)
9. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal’) (CWE-22)
10. Missing Authentication for Critical Function (CWE-306)
4.
FLASHCARD QUESTION
Front
Use-After-Free (CWE-416)
Back
Description:
• The product reuses or references memory after it has been freed.
• At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation.
• Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Prevention:
• Choose a language that provides automatic memory management.
• When freeing pointers, be sure to set them to NULL once they are freed.
Detection:
• Fuzzing
• Automatic static analysis
5.
FLASHCARD QUESTION
Front
Use-After-Free (CWE-416): note
Back
• UAF not only relates to pointers and memory.
• UAF(-like) weaknesses can be found also when other resources (e.g., file handles or network connections) are mismanaged.
• Hence, UAF can occur also in languages (e.g., Java) with automatic memory management system.
6.
FLASHCARD QUESTION
Front
Heap-based Buffer Overflow (CWE-122)
Back
Description:
• A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using malloc() or new().
Prevention:
• Use automatic buffer overflow detection mechanisms
• Implement and perform bounds checking on input.
• Do not use dangerous functions such as gets. Look for their safe equivalent, which checks for the boundary.
Detection:
• Fuzzing
• Automated static analysis
7.
FLASHCARD QUESTION
Front
Out-of-bounds Write (CWE-787)
Back
Description:
• The product writes data past the end, or before the beginning, of the intended buffer.
• Often used to describe the consequences of writing to memory outside the bounds of a buffer, or to memory that is otherwise invalid.
Prevention:
• Double check that the buffer is as large as specified
and check buffer boundaries.
• Replace unbounded copy functions with analogous functions that support length arguments, such as strcpy with strncpy. Create these if they are not available.
Detection:
• Automated static analysis
• Automated dynamic analysis (fuzzing, fault-injection based testing)
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
10 questions
Forest Self-Management
Lesson
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
30 questions
Thanksgiving Trivia
Quiz
•
9th - 12th Grade
30 questions
Thanksgiving Trivia
Quiz
•
6th Grade
11 questions
Would You Rather - Thanksgiving
Lesson
•
KG - 12th Grade
48 questions
The Eagle Way
Quiz
•
6th Grade
10 questions
Identifying equations
Quiz
•
KG - University
10 questions
Thanksgiving
Lesson
•
5th - 7th Grade
Discover more resources for Others
10 questions
Identifying equations
Quiz
•
KG - University
7 questions
Different Types of Energy
Interactive video
•
4th Grade - University
20 questions
HS2C2 AB QUIZIZZ
Quiz
•
1st Grade - Professio...
14 questions
Homonyms Quiz
Quiz
•
KG - University
16 questions
Parts of a Parabola
Quiz
•
8th Grade - University
10 questions
A Brief History of Geologic Time
Interactive video
•
11th Grade - University
15 questions
Black Friday/Cyber Monday
Quiz
•
9th Grade - University
7 questions
Biomolecules (Updated)
Interactive video
•
11th Grade - University