Packet Analysis 1 PEs Flashcards

1
Q

How many bytes make up a shellcode?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If an attacker knew how a program organizes its memory how could it attack that system?

A

Inputting too much information for the buffer to handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a buffer overflow attack what gets over-written?

A

Memory of an Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a multi-byte sled have to support?

A

single opcode inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a method used to get a target machine to initiate an outgoing connection?

A

Connect Back (reverse shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A buffer can be located _____

  • In the heap
  • On the stack
  • In the data section of the process
  • All of the Above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a reverse shell who establishes the connection?

A

remote

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the storage region that holds data while being transferred called?

A

buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True/False You can determine in advance exactly where the targeted buffer will be located in the stack frame.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is it called when data stored in the heap is overwritten?

A

Heap Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of an attack is it, when the input is used in the construction of a command that is subsequently executed by the system with privileges of the Web server.

A

Command Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what type of sled can the opcode jump straight to the shell code?

A

Trampoline Sled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Run-Time defense that blocks an attacker’s ability to find out where the stack is by placing it in a random spot in memory?

A

Address Space Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three places a buffer overflow usually targets? (use format Alpha, Bravo, Charlie)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three places a buffer overflow usually targets? (use format Alpha, Bravo, Charlie)

A

stack, heap or data section

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the locations in the stack area used to store the values referring to one invocation of a routine?

A
17
Q

What helps move code into the next memory address?

A

NOP Sled

18
Q

What type of an attack is it when the user-supplied input is used to construct a SQL request to retrieve information from a database?

A

SQL Injection

19
Q

What is the structure that stores data held on the stack?

A

UNKNOWN

20
Q

True or False Shellcode is not specific to a particular processor architecture?

A

False

21
Q

Servers can find it inconvenient to have ____ ____ port numbers assigned.

A

Short Term

22
Q

What is the code supplied by the attacker which is often saved in the buffer being overflowed so that it can be executed?

A

Shellcode

23
Q

_____ is a form of buffer overflow attack.

  • Heap overflows
  • Return to System call
  • Replacement stack frame
  • All of the Above
A

All of the aboce

24
Q

What is the process called of setting a port number to a socket?

A

Binding

25
Q

What is a data structure that is used to store values in a particular order and processes the dynamic variables used in the program?

A

stack