Question: Shellcode / more advanced attacks [ 2 pages ] Try to explain how the shellcode example given to you works, cover the following points: How
Shellcode more advanced attacks pages
Try to explain how the shellcode example given to you works, cover the following points:
How do you get the shellcode to work? Eg padding or addresses required, how these are determined, what is happening when the exploit works. How can the padding be used to increase the chances of the shellcode running?
For the shellcode itself, describe how it works. You can start with an overview of each of the sections highlighted each does a particular job If you manage this then a more detailed analysis of the code can be given.
For each of the protection mechanisms discuss in the lectures how effective would they be in preventing this type of attack?
One method that can potentially be used by an attacker to bypass protection mechanisms that would stop traditional shellcode attacks is Return Oriented Programming ROP
What is ROP?
How does it work?
Which protection mechanisms is it likely to defeat? Why? Which protection mechanisms are likely to be effective?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
