[Guruji]:- System Attack # 4
Assign an invalid file name
· File names often restricted by the file system, or can exploit common standards used by the file system (long names, weird characters, etc.)
System Attack # 5
Vary file access permissions
· Can uncover subtle bugs if apps might require most general permissions
· Example: Web server app may not function properly unless “all” permission set to readable, but then this might compromise security
System Attack # 6
Vary or corrupt file contents
· Simulates data being modified intentionally (perhaps maliciously) or incidentally (e.g., during transmission). Many apps may not check for an error code
[Continued in the next day’s post]