hws/hw03.tex
changeset 257 9bc912fcedb6
parent 239 0db764174afb
child 276 d7109c6e721d
equal deleted inserted replaced
256:e272713e34ff 257:9bc912fcedb6
    16 \item How does a buffer-overflow attack work? (Hint: What happens on
    16 \item How does a buffer-overflow attack work? (Hint: What happens on
    17   the stack.)
    17   the stack.)
    18 
    18 
    19 \item Why is it crucuial for a buffer overflow attack that the stack
    19 \item Why is it crucuial for a buffer overflow attack that the stack
    20   grows from higher addresses to lower ones?
    20   grows from higher addresses to lower ones?
       
    21 
       
    22 \item If the attacker uses a buffer overflow attack in order to
       
    23 inject code, why can this code not contain any zero bytes?
    21 
    24 
    22 \item How does a stack canary help with preventing a buffer-overflow
    25 \item How does a stack canary help with preventing a buffer-overflow
    23   attack?
    26   attack?
    24 
    27 
    25 \item Why does randomising the address where programs are run help
    28 \item Why does randomising the address where programs are run help