Deck 10: Buffer Overflow
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 10: Buffer Overflow
1
To exploit any type of buffer overflow the attacker needs to identify abuffer overflow vulnerability in some program that can be triggeredusing externally sourced data under the attackers control.
True
2
A buffer overflow error is not likely to lead to eventual programtermination.
False
3
There are several generic restrictions on the content of shellcode.
True
4
At the basic machine level, all of the data manipulated by machineinstructions executed by the computer processor are stored in either the processor's registers or in memory.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Shellcode must be able to run no matter where in memory it islocated.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Buffer overflows can be found in a wide variety of programs,processing a range of different input, and with a variety of possibleresponses.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Buffer overflow attacks are one of the most common attacks seen.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The potential for a buffer overflow exists anywhere that data is copiedor merged into a buffer, where at least some of the data are read fromoutside the program.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The function of ________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program.
A) shellcode
B) stacking
C) no-execute
D) memory management
A) shellcode
B) stacking
C) no-execute
D) memory management
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
An attacker can generally determine in advance exactly where thetargeted buffer will be located in the stack frame of the function inwhich it is defined.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Even though it is a high-level programming language, Java still suffersfrom buffer overflows because it permits more data to be saved into a buffer than it has space for.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
A consequence of a buffer overflow error is __________ .
A) corruption of data used by the program
B) unexpected transfer of control in the program
C) possible memory access violation
D) all the above
A) corruption of data used by the program
B) unexpected transfer of control in the program
C) possible memory access violation
D) all the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Buffer overflow exploits are no longer a major source of concern tosecurity practitioners.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
A stack overflow can result in some form of a denial-of-service attackon a system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Shellcode is not specific to a particular processor architecture.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A stack buffer overflow is also referred to as ___________ .
A) stack framing
B) stack smashing
C) stack shocking
D) stack running
A) stack framing
B) stack smashing
C) stack shocking
D) stack running
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
An attacker is more interested in transferring control to a location andcode of the attacker's choosing rather than immediately crashing theprogram.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information.
A) overflow
B) overrun
C) overwrite
D) all the above
A) overflow
B) overrun
C) overwrite
D) all the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Stack buffer overflow attacks were first seen in the Aleph One Worm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988.
A) Code Red
B) Slammer
C) Morris Internet
D) Alpha One
A) Code Red
B) Slammer
C) Morris Internet
D) Alpha One
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A ___________ overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function's stack frame.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Data is simply an array of _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
_________ is a form of overflow attack.
A) Heap overflows
B) Return to system call
C) Replacement stack frame
D) All the above
A) Heap overflows
B) Return to system call
C) Replacement stack frame
D) All the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
_________ is a tool used to automatically identify potentially vulnerable programs.
A) Slamming
B) Sledding
C) Fuzzing
D) All the above
A) Slamming
B) Sledding
C) Fuzzing
D) All the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000.
A) Slammer worm
B) Morris Internet Worm
C) Sasser worm
D) Code Red worm
A) Slammer worm
B) Morris Internet Worm
C) Sasser worm
D) Code Red worm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A __________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer and consequently overwrites adjacent memory locations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ defenses aim to harden programs to resist attacks in new programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The Packet Storm Web site includes a large collection of packaged shellcode, including code that can:
A) create a reverse shell that connects back to the hacker
B) flush firewall rules that currently block other attacks
C) set up a listening service to launch a remote shell when connected to
D) all the above
A) create a reverse shell that connects back to the hacker
B) flush firewall rules that currently block other attacks
C) set up a listening service to launch a remote shell when connected to
D) all the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
"Smashing the Stack for Fun and Profit" was a step by step introduction to exploiting stack-based buffer overflow vulnerabilities that was published in Phrack magazine by _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
__________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The buffer is located __________ .
A) in the heap
B) on the stack
C) in the data section of the process
D) all the above
A) in the heap
B) on the stack
C) in the data section of the process
D) all the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.
A) Compile-time defenses
B) Shellcodes
C) Run-time defenses
D) All the above
A) Compile-time defenses
B) Shellcodes
C) Run-time defenses
D) All the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ defenses aim to detect and abort attacks in existing programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
An essential component of many buffer overflow attacks is the transfer of execution to code supplied by the attacker and often saved in the buffer being overflowed. This code is known as _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Traditionally the function of __________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program.
A) shellcode
B) C coding
C) assembly language
D) all the above
A) shellcode
B) C coding
C) assembly language
D) all the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The __________ used a buffer overflow exploit in "fingerd" as one of its attackmechanisms.
A) Code Red Worm
B) Sasser Worm
C) Morris Internet Worm
D) Slammer Worm
A) Code Red Worm
B) Sasser Worm
C) Morris Internet Worm
D) Slammer Worm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
__________ can prevent buffer overflow attacks, typically of global data, whichattempt to overwrite adjacent regions in the processes address space, such as the global offset table.
A) MMUs
B) Guard pages
C) Heaps
D) All the above
A) MMUs
B) Guard pages
C) Heaps
D) All the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A buffer overflow in MicroSoft Windows 2000/XP Local Security Authority Subsystem Service was exploited by the _________ .
A) Aleph One
B) Sasser worm
C) Slammer worm
D) none of the above
A) Aleph One
B) Sasser worm
C) Slammer worm
D) none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Shellcode has to be __________, which means it cannot contain any absolute address referring to itself.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
_________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to a coding error, allows just one more byte to be copied than there is space available.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A _________ value is named after the miner's bird used to detect poisonous air in a mine and warn miners in time for them to escape.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
In the classic __________ overflow, the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved frame pointer and return address.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The _________ is typically located above the program code and global data and grows up in memory (while the sack grows down toward it).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Gaps, or __________ , are flagged in the MMU as illegal addresses, and any attempt to access them results in the process being aborted.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck