{"id":713,"date":"2025-04-18T04:39:35","date_gmt":"2025-04-18T04:39:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/epres010\/?p=713"},"modified":"2025-04-18T04:39:35","modified_gmt":"2025-04-18T04:39:35","slug":"cs-462-attack-techniques","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/epres010\/2025\/04\/18\/cs-462-attack-techniques\/","title":{"rendered":"CS 462 &#8211; Attack Techniques"},"content":{"rendered":"\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<p><strong>Read the brief article about \u201cSQL Injection loses #1 spot as most dangerous attack technique\u201d at\u00a0<a href=\"https:\/\/securityboulevard.com\/2019\/12\/sql-injection-loses-1-spot-as-most-dangerous-attack-technique\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/securityboulevard.com\/2019\/12\/sql-injection-loses-1-spot-as-most-dangerous-attack-technique<\/a><\/strong><\/p>\n\n\n\n<p><strong>The article mentions a new technique used to rank the most dangerous vulnerabilities. At the end it mentions the top 3 vulnerabilities. Research on the top vulnerability listed and provide any other articles you came across about it.<\/strong><\/p>\n\n\n\n<p>While SQL Injection was one of the most dangerous attack techniques, \u201cImproper Restriction of Operations within the Bounds of a Memory Buffer\u201d or CWE-119 has taken that position due to the Common Weakness Enumeration. CWE-199 is a vulnerability where there are little to no restrictions on devices that work on a memory buffer, and they can read and write code outside of the intended boundary. This allows for attacks like buffer overflow, where attackers can inject code into a device\u2019s memory to cause different issues. This can include an out-of-bounds read, which gives access to sensitive information. There is also memory corruption, where malicious code injection manipulates the memory\u2019s contents or leads to it crashing. However, there are mitigation strategies for this issue. Some of them are choosing languages with overflow protection, effectively implementing application memory, and using software and hardware with data execution protection.<\/p>\n\n\n\n<p><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/119.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cwe.mitre.org\/data\/definitions\/119.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.immuniweb.com\/vulnerability\/buffer-errors.html#description\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.immuniweb.com\/vulnerability\/buffer-errors.html#description<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Read the brief article about \u201cSQL Injection loses #1 spot as most dangerous attack technique\u201d at\u00a0https:\/\/securityboulevard.com\/2019\/12\/sql-injection-loses-1-spot-as-most-dangerous-attack-technique The article mentions a new technique used to rank the most dangerous vulnerabilities. At the end it mentions the top 3 vulnerabilities. Research on the top vulnerability listed and provide any other articles you came across about it. While &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/epres010\/2025\/04\/18\/cs-462-attack-techniques\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CS 462 &#8211; Attack Techniques<\/span><\/a><\/p>\n","protected":false},"author":24915,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/713"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/users\/24915"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/comments?post=713"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/713\/revisions"}],"predecessor-version":[{"id":714,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/713\/revisions\/714"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/media?parent=713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/categories?post=713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/tags?post=713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}