equal
deleted
inserted
replaced
16 \item How does a buffer-overflow attack work? (Hint: What happens on |
16 \item How does a buffer-overflow attack work? (Hint: What happens on |
17 the stack.) |
17 the stack.) |
18 |
18 |
19 \item Why is it crucuial for a buffer overflow attack that the stack |
19 \item Why is it crucuial for a buffer overflow attack that the stack |
20 grows from higher addresses to lower ones? |
20 grows from higher addresses to lower ones? |
|
21 |
|
22 \item If the attacker uses a buffer overflow attack in order to |
|
23 inject code, why can this code not contain any zero bytes? |
21 |
24 |
22 \item How does a stack canary help with preventing a buffer-overflow |
25 \item How does a stack canary help with preventing a buffer-overflow |
23 attack? |
26 attack? |
24 |
27 |
25 \item Why does randomising the address where programs are run help |
28 \item Why does randomising the address where programs are run help |