Member-only story

Cyber Security: More Application Attacks

Jesse L
3 min readOct 4, 2021

--

Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of data that is being stored digitally, and this includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over some attack methods and strategies that hackers might use so you can be aware of them. This is a continuation of Cyber Security: Types of Application Attacks which can be found here.

Directory Traversal

A directory traversal attack occurs when a vulnerability, typically an HTTP vulnerability, is exploited to manipulate user input to access files or traverse a file directory that is not intended to be visible. This can also be known as the “dot slash” or “./” attack. Directory traversal attacks can be mitigated by avoiding passing direct user input into file systems.

Buffer Overflow

Buffer overflows occur when more data is written to a buffer than it can handle. This causes the program to write to adjacent memory then make calls to wrong addresses. This causes the program to either crash or behave differently than expected. Buffer overflows can also contain executable code that can be used with malicious intent.

Race Conditions

--

--

Jesse L
Jesse L

Written by Jesse L

Hi, I'm a passionate technology enthusiast and lifelong learner. Beyond my technical pursuits, I'm also passionate about sharing my enthusiasm with others.

Responses (1)