Lec 8: Software Security 1: Implementation Vulnerabilities 1: Stack Flashcards
1
Q
When is a program secure?
A
2
Q
What is a software vulnerability?
A
3
Q
What is a buffer overflow?
A
4
Q
What makes buffer overflow attacks able to occur?
A
5
Q
What steps do you need to do to hijack control of a system?
A
6
Q
What do stack activations for C look like in memory?
A
7
Q
What does this example look like in Windows x86?
A
8
Q
Why is strcpy() unsafe?
A
9
Q
Why is it called shellcode?
A
- trying to run a shell
10
Q
What are some challenges for an buffer overflow attacker?
A
11
Q
What are some examples of string-based bufer overflows that have happened in history?
A
12
Q
Why are string-based buffer overflows able to happen? What are solutions to this problem?
A
13
Q
What is the problem with using strncpy() to prevent buffer overflows?
A
14
Q
A
15
Q
A