1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Buffer Overflow is one of the most common security vulnerabilities in software
True
Buffer Overflow
A condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information
How can attackers exploit buffer overflow?
Attackers can use it to crash a system or insert specially crafted code to gain control to the system
Common and Moderate Impact of Buffer Overflow
Denial of Service
Common and Critical Impact of Buffer Overlow
Remote Code Execution
Static data (compile time) used by user program is stored in ______
Global Data Segment
Dynamic data (data allocated at run-time) used by user program in stored in ______
Heap
Stack
Used by user program to store temporary data, like subroutine calls
Stores local variables created by each function
Function calls
Kernel Segment
Stores kernel level code and static data used by the kernel
What is a frame?
A chunk of data for a given function
ebp (stack base)
Start of current frame
esp (stack pointer)
End of current frame
eip (instruction pointer)
Next instruction
Where does attack want to insert malicious code?
at pointer/ return address ret (main), before ebp