Question: An stack-based buffer overflow attack used to : 1.1.get access and read the data from the stack; 1.2.get access and write data to the stack;
An stack-based buffer overflow attack used to : 1.1.get access and read the data from the stack; 1.2.get access and write data to the stack; 1.3. write a program code to the stack and execute the program; 1.4.find the type of Operating System used. 1. 2. Attackers use many NOP codes in their programs for stack-overflow attacks because 2.1. it is difficult to locate the beginning of the program 2.2. the attacker tries to hide the real program code between these NOP-instructions 2.3. it helps to hide the program from the IDS 2.4. it makes the execution of the program faster. 3. NOP in the previous question means: . 3.1. Network Optimization Procedure; 3.2. No Optimization; 3.3. Network Oriented Processor 3.4. No Operation. Buffer overflow attacks can be prevented by: 4.1. Not using stack in the programs; 4.2. Carefully testing software to avoid mistakes in allocation of memory space; 4.3. Allocating all the variables in the stack; 4. 4.4. Dividing a program into small segments
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
