Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
9 Cards in this Set
- Front
- Back
Buffer Overflow |
Heap grows to overwrite the return address of a program. Return address may be overwritten to return to malicious code. |
|
Canary |
Random value placed between the local variables and the return address. If the Canary is modified, the program is stopped. |
|
Heap Spraying |
Write over heap with target address. Hope that the victim uses an overwritten function pointer before program crashes. |
|
SQL Injection |
User provides a substring for a SQL query that changes the query entirely. |
|
Name Resolution |
Use of a name label to obtain access to system resources |
|
Name Server |
Performs name resolution using names pace bindings(e.g. directory) to convert a name (e.g. filename) into a resource (e.g.) |
|
Improper Resource Attack |
Adversary controls final resource in unexpected ways.Victim expects high integrity, gets low integrity instead. |
|
Improper Binding Attack |
Adversary controls binding to redirect victim to a resource not under adversary ' control. Victim expects low integrity/secrecy, gets high integrity instead. |
|
Race Conditions |
Adversary exploits non-atomicity in "check" and "use" of resource to conduct improper Resource and improper Binding attacks |