Question: 4.12. Why does ASLR make buffer-overflow attack more difficult? 4.13. To write a shellcode, we need to know the address of the string /bin/sh. If

4.12. Why does ASLR make buffer-overflow attack more difficult? 4.13. To write a shellcode, we need to know the address of the string "/bin/sh". If we have to hardcode the address in the code, it will become difficult if ASLR is turned on Shellcode solved that problem without hardcoding the address of the string in the code. Please explain how the shellcode in exploit.c (Listing 4.2) achieved that. 4.12. Why does ASLR make buffer-overflow attack more difficult? 4.13. To write a shellcode, we need to know the address of the string "/bin/sh". If we have to hardcode the address in the code, it will become difficult if ASLR is turned on Shellcode solved that problem without hardcoding the address of the string in the code. Please explain how the shellcode in exploit.c (Listing 4.2) achieved that
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
