What is the general algorithm for a stack overrun attack?

What will be an ideal response?


The algorithm for a stack overrun attack is roughly as follows:
1. Detect a program that is vulnerable to a buffer overflow.
2. Determine the number of bytes needed to overwrite the return address.
3. Compute the address to point to the alternate code.
4. Develop the alternate code to be executed.
5. Integrate and test.
6. Continue to use the problematic program to stage other attacks.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A typical MPEG-2 consists of a repeating GOP structure. 2. There is only one I-frame in an MPEG video. 3. Progressive download requires a streaming server. 4. True streaming requires a streaming server. 5. Progressive download and pseudostreaming allow the video to start playing as soon as enough of the video data has arrived.

Computer Science & Information Technology

Write a decision statement to determine if an object should be downcast.

What will be an ideal response?

Computer Science & Information Technology

All of the following are acceptable field names EXCEPT:

A) ClientNumber B) Clientnumber C) ClientID D) ClientNum

Computer Science & Information Technology

________ is used to exclude particular categories or values from a PivotTable

A) Mining B) Outlining C) Filtering D) Grouping

Computer Science & Information Technology