9 Flashcards

1
Q

Buffer overflow:

A

Condition where input exceeds the buffer’s capacity so it starts overwriting other information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Buffer overflow consequences:

A
  • Corruption
  • Transfer of control
  • Memory access violation
  • Malicious code execution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shellcode:

A

Machine code supplied by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stack overflow targets:

A
  • System utility
  • Network service Daemon
  • Common library code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shellcode functions:

A
  • Launch remote shell
  • Create reverse shell
  • Use local exploits to establish a shell
  • Flush firewall rules
  • Break out of a chroot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Buffer overflow compile-time defenses:

A
  • Modern languages
  • Safe coding
  • Safety extensions
  • Stack protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Buffer overflow run-time defenses:

A
  • Non-executable memory
  • Randomized addresses
  • Guard pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Overflow attacks:

A
  • Stack
  • Heap
  • Global data
  • Format string
  • Integer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Replacement stack frame:

A

Rewriting buffer and frame pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Return to system call:

A

Replacing return address with a function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Approaches to reduce software vulnerabilities:

A
  • Stop them before they occur
  • Find them before they’re exploited
  • Reduce their impact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defensive programming:

A

Making sure software still functions with unexpected input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Injection attack:

A

Invalid input that influences execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cross-site scripting attack:

A

Input from a user is executed on another user’s browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Input fuzzing:

A

Using randomly generated inputs to test abnormal input handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Race condition:

A

When multiple processes access shared memory