0% found this document useful (0 votes)
4 views2 pages

ch7 Short

The document outlines various cybersecurity vulnerabilities categorized into application-based, OS-based, web-based, hardware, network-based, cryptographic, and misconfiguration vulnerabilities. Each category includes specific vulnerabilities, their potential impacts, and recommended fixes. The document serves as a comprehensive cheatsheet for identifying and mitigating cybersecurity risks.

Uploaded by

amansharma2318
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

ch7 Short

The document outlines various cybersecurity vulnerabilities categorized into application-based, OS-based, web-based, hardware, network-based, cryptographic, and misconfiguration vulnerabilities. Each category includes specific vulnerabilities, their potential impacts, and recommended fixes. The document serves as a comprehensive cheatsheet for identifying and mitigating cybersecurity risks.

Uploaded by

amansharma2318
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CH-7 Cheatsheet (Cybersecurity Vulnerabilities)

1. Application-Based Vulnerabilities

●​ Buffer Overflow: Exceeds memory boundary → crash/code execution.


○​ Fix: Input validation, bounds checking.
●​ Race Conditions: Two threads access same resource unsafely.
○​ Fix: Use locks/synchronization.
●​ Input Validation Failures: Unsanitized inputs → code injection.
○​ Fix: Sanitize/validate input.

2. OS-Based Vulnerabilities

●​ Privilege Escalation: Gain higher-level access.


○​ Fix: Patch management, least privilege.
●​ Unpatched Systems: Known bugs left unfixed.
○​ Fix: Regular updates.
●​ Insecure Services: Weak/default configs.
○​ Fix: Disable unused services, secure configs.

3. Web-Based Vulnerabilities

●​ SQL Injection (SQLI): Inject SQL via inputs.


○​ Fix: Input validation, parameterized queries, stored procedures.
●​ XSS (Cross-Site Scripting): Inject JS in browser context.
○​ Fix: Sanitize output, use CSP, encode data.

4. Hardware Vulnerabilities

●​ Firmware Bugs: Low-level flaws → full system compromise.


○​ Fix: Firmware updates, secure boot.
●​ EOL Systems: No vendor support.
○​ Fix: Replace or isolate, segment network.
●​ Legacy Systems: Outdated, insecure tech.
○​ Fix: Upgrade, restrict access.

5. Network-Based Vulnerabilities

●​ Sniffing: Capturing network traffic.


○​ Fix: Use encryption (TLS, VPN).
●​ Spoofing: Faking identity/IP.
○​ Fix: Authentication, network segmentation.
●​ DDoS: Overload server.
○​ Fix: Firewalls, rate limiting, CDNs.
6. Cryptographic Vulnerabilities

●​ CA Compromise: Fake certificates.


○​ Fix: Certificate pinning, CT logs.
●​ Key Compromise: Stolen/weak keys.
○​ Fix: HSMs, key rotation.
●​ Flawed Implementation: Bugs in crypto code.
○​ Fix: Use vetted libraries, audits.
●​ Outdated Algorithms: Weak ciphers (e.g. MD5, DES).
○​ Fix: Use AES, SHA-256, RSA-2048+.
●​ Side-Channel Attacks: Exploit timing/power.
○​ Fix: Constant-time ops, shielding.
●​ Backdoors: Hidden access.
○​ Fix: Use audited open-source tools.
●​ Weak RNGs: Predictable keys.
○​ Fix: CSPRNGs, hardware entropy.
●​ CRL/OCSP Issues: Ignored revocations.
○​ Fix: Enforce OCSP, monitor infrastructure.
●​ Key Management Errors: Poor key handling.
○​ Fix: Secure storage, rotation, recovery plans.
●​ SSL Stripping: Downgrade HTTPS → HTTP.
○​ Fix: HSTS, force HTTPS.
●​ Protocol Downgrade: Force weak SSL/TLS.
○​ Fix: Disable SSLv3/TLS1.0, enforce strong ciphers.

7. Misconfiguration Vulnerabilities

●​ Network Devices: Default creds, open ports.


○​ Fix: Change defaults, patch firmware.
●​ Firewalls: Loose rules, unmonitored ports.
○​ Fix: Least privilege, audit rules.
●​ Default Credentials: Vendor passwords.
○​ Fix: Change during setup, strong policies.
●​ Unpatched Software: Old versions.
○​ Fix: Patch management, auto-updates.
●​ Excessive Privileges: Unnecessary access.
○​ Fix: RBAC, periodic audits.

You might also like