• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/7

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

7 Cards in this Set

  • Front
  • Back
Buffer overflows
Most common security vulnerability
Important ingredients:
program that suid to root
put root-grabbing code in address space
jump to that code
3 regions of process memory (low to high memory address)
text: includes program instructions, read only
data: static variables and heap memory
stack: ADT for function calls
stack
stack pointer points to top
bottom is fixed address
parameters pushed in reverse order
move toward low memory address
stack picture (low to high memory address)
local variables
sfp
ret
parameters
to find overflows
read source code
run service, attempt systematic crash, search core dump for given log tag
automated tools
preventing overflows
don't use strcpy, strcat, sprintf
type safe languages
non-executable stack
random stack location
run-time checks (random or terminator canaries)
other types of attack
integer overflow
letting user specify format string
return to libc overflow (let system call do work when buffer to small...)