XML External Entity (XXE) attacks are a type of security vulnerability that affects applications using XML input. When an application processes XML data without proper safeguards, attackers can exploit features that allow external entities to be loaded. This can lead to sensitive data exposure, denial of service, or even system compromise. XXE attacks often occur…
Category: Anti Attack
Race Condition Attacks
Race condition attacks occur when two or more processes or users try to access or change the same data at the same time, causing unexpected results. Attackers exploit these situations by timing their actions to interfere with normal operations, potentially gaining unauthorised access or privileges. These attacks often target systems where actions are not properly…
Heap Overflow Protection
Heap overflow protection refers to techniques and tools used to prevent or detect when a program writes more data to a memory area, called the heap, than it should. This kind of overflow can lead to software bugs, crashes, or security vulnerabilities, especially if attackers exploit it to control a system. Protection methods include special…
Stack Smashing Protection
Stack smashing protection is a security feature built into many modern computer programs and operating systems. It helps prevent attackers from exploiting buffer overflows, which occur when a program writes more data to a block of memory, or stack, than it can hold. By adding extra checks and safeguards, stack smashing protection makes it much…
Cache Timing Attacks
Cache timing attacks are a type of side-channel attack where an attacker tries to gain sensitive information by measuring how quickly data can be accessed from a computer’s memory cache. The attacker observes the time it takes for the system to perform certain operations and uses these measurements to infer secrets, such as cryptographic keys….
Microarchitectural Attacks
Microarchitectural attacks are security exploits that take advantage of the way computer processors work internally, rather than flaws in software or operating systems. These attacks manipulate how hardware components like caches, branch predictors, or execution pipelines behave to extract sensitive information. This can allow attackers to access data they should not be able to see,…
Spectre and Meltdown Mitigations
Spectre and Meltdown are security vulnerabilities found in many modern computer processors. They allow attackers to read sensitive data from a computer’s memory that should be protected. Mitigations are techniques and software updates designed to prevent these attacks, often by changing how processors handle certain tasks or by updating operating systems to block malicious behaviour.
Rowhammer Attacks
Rowhammer attacks are a type of cyberattack that target the physical memory chips in computers, especially DRAM. By rapidly and repeatedly accessing specific rows of memory, attackers can cause tiny electrical disturbances that flip bits in nearby rows. This can lead to unauthorised changes in data, potentially allowing attackers to bypass security measures or gain…
Cold Boot Attacks
Cold boot attacks are a type of security exploit where an attacker gains access to data stored in a computer’s memory by restarting the machine and quickly extracting the memory chips. This works because data in RAM can remain readable for a short period after power is turned off, especially if the chips are cooled…