• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
1. A ________ is a condition where more input is placed into a buffer or data holding area than the capacity allocated and thus overwrites other information.
buffer overrun (buffer overflow)
2. At the basic machine level, all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor’s registers or in ________.
memory
3. _______ was one of the earliest operating systems written in a high-level language.
UNIX
4. A _______ overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function’s stack frame.
stack buffer
5. The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.
shellcode
6. One of the restrictions on the content of shellcode is that it has to be _______, which means that it cannot contain any absolute address referring to itself.
position independent
7. ______ defenses aim to harden programs to resist attacks in new programs.
Compile-time
8. _______ defenses aim to detect and abort attacking existing programs.
Run-time
9. The _________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system.
OpenBSD
10. Stackshield, Return Address Defender and ________ are GCC compiler extensions that insert additional function entry and exit code.
Stackguard
11. ________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to a coding error, allows just one more byte to be copied than there is space available.
Off-by-one
12. In 1996 ________ published “Smashing the Stack for Fun and Profit” in Phrack magazine, giving a step-by-step introduction to exploiting stack-based buffer overflow vulnerabilities.
Aleph One
13. A _________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.
buffer overflow
14. _______ can be placed between stack frames or between different allocations on the heap to provide further protection against stack and heap overflow attacks, but at cost in execution time supporting the large number of page mappings necessary.
Guard pages
15. The attacker can specify the return address used to enter code as a location somewhere in the run of NOPs, which is called a NOP ______.
sled