What is the general algorithm for a stack overrun attack?
What will be an ideal response?
The algorithm for a stack overrun attack is roughly as follows:
1. Detect a program that is vulnerable to a buffer overflow.
2. Determine the number of bytes needed to overwrite the return address.
3. Compute the address to point to the alternate code.
4. Develop the alternate code to be executed.
5. Integrate and test.
6. Continue to use the problematic program to stage other attacks.
You might also like to view...
Discuss the considerations for developing an efficient navigation system.
What will be an ideal response?
Case 14-1 Jenny, a programmer, uses Microsoft Excel 2016 to generate data required for the programs she develops. She uses various functions in Excel to perform the required calculations. Jenny is coding a security program to generate numerical passwords in Excel. Jenny should use the _____ function to generate the numerical portions of the passwords arbitrarily.
A. ?SUM() B. ?RAND() C. ?ROUND() D. ?INT()
What key combination inserts an indent within the cell of a table in PowerPoint 2013?
A) Alt+Tab B) Ctrl+right arrow C) Shift+Tab D) Ctrl+Tab
You can drag in a grid to define the size of a ____.
A. chart B. picture C. table D. SmartArt graphic