100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CNIT 455 Exam 3 Questions and Answers 100% Pass

Rating
-
Sold
-
Pages
33
Grade
A+
Uploaded on
30-01-2024
Written in
2023/2024

CNIT 455 Exam 3 Questions and Answers 100% Pass Software vulnerabilities are typically a result of what? - non-secure coding - "make it work first and secure it later" approach How can vulnerabilities be discovered in open source code? - can be analyzed natively How can vulnerabilities be discovered in closed source code? - must be reverse engineered What are RCE tools? - used by disassemblers to convert binary to assembly language for analysis - means of understanding memory usage and basic logic flow of application - hex editors can be used to change constants/operations once memory offset is found What is an overflow attack? - most common means of running malware on a target - occurs when application doesn't check length of input being placed into variable or buffer - always creates a problem What is a buffer overflow? - most commonly used attack vector - too much is put into a variable and the memory is overwritten immediately following - critical to keep Internet applications "boxed in" as a result What is the process for exploiting an application buffer overflow? - redirect processor to memory be overflowed by attacking stack (ie. arguments, return address, previous frame pointer, local variables, buffer) - overflow buffer to replace return address with address of planted code What are some examples of buffer overflow attacks? - NOP sled - jump to register What is a NOP sled? - oldest and most widely used technique - series of hoops with jump at end of shellcode is written - increases likelihood of hitting exploit code in stack - modern IDS systems look for this type of attack What is a jump to register buffer overflow attack? - jump to register is overwritten with jump to exploit code - available in error handling routines - most common approach used in modern Internet worms What is a heap overflow? - overflow of area of memory used for variable storage (ie. contains UIDs, passwords, etc) - variables can be changed to provide different level of access to steal information - not used as often in attacks What is an example of a heap overflow attack? Microsoft JPEG GDI+ vulnerability How can overflow attacks be prevented? - always bound check input when coding - use automatic code checking and safe libraries - utilize hardware protection (bit in memory address to denote executability) What are some overflow attack prevention tools Windows - Microsoft Data Execution Prevention - BufferShield - Stack Defender UNIX - W^X - PaX

Show more Read less
Institution
CNIT 455
Course
CNIT 455











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CNIT 455
Course
CNIT 455

Document information

Uploaded on
January 30, 2024
Number of pages
33
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1897
Member since
2 year
Number of followers
864
Documents
21000
Last sold
3 hours ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

434 reviews

5
234
4
78
3
60
2
24
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions