Deck 10: Buffer Overflow

ملء الشاشة (f)
exit full mode
سؤال
Buffer overflow attacks result from careless programming in
applications.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The buffer overflow type of attack is one of the least commonly seen
attacks.
سؤال
The first widely used occurrence of the buffer overflow attack was the _______.

A)Code Red Worm
B)Morris Internet Worm
C)Sasser Worm
D)Slammer Worm
سؤال
The x86 Assembly Language Instruction NOP means _______.

A)no operation or do nothing instruction
B)call function at addr
C)software interrupt to access operating system function
D)no push value onto the stack
سؤال
Several of the items in the CWE/SANS Top 25 Most Dangerous
Software Errors list,Risky Resource Management category,are buffer
overflow variants.
سؤال
The attacker is able to precisely specify the starting address of the
instructions in the shellcode.
سؤال
A ______ is a structure where data are usually saved on the stack.

A)guard page
B)stack frame
C)heap
D)NOP sled
سؤال
A stack buffer overflow attack is also referred to as ______.

A)stack smashing
B)stack framing
C)buffer overrunning
D)heap overflowing
سؤال
Shellcode is not specific to a particular processor architecture.
سؤال
A stack overflow can result in some form of denial-of-service attack on
a system.
سؤال
A _______ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer.

A)shellcode
B)program overflow
C)buffer overflow
D)library function
سؤال
C's designers placed much more emphasis on space efficiency and
performance considerations than on type safety.
سؤال
The JAVA programming language is extremely vulnerable to buffer
overflows.
سؤال
Buffer overflows can be found in a wide variety of programs.
سؤال
A successful buffer overflow attack results in the loss of the function
or service the attacked program provided.
سؤال
The only consequence of a buffer overflow attack is the possible
corruption of data used by the program.
سؤال
The possibility of overwriting the saved frame pointer and return
address forms the core of a stack overflow attack.
سؤال
To exploit any type of buffer overflow the attacker needs to understand
how that buffer will be stored in the processes memory.
سؤال
The responsibility is placed on the assembly language programmer to
ensure that the correct interpretation is placed on any saved data value.
سؤال
An effective method for protecting programs against classic stack
overflow attacks is to instrument the function entry and exit code to
setup and then check its sack frame for any evidence of corruption.
سؤال
_______ defenses aim to detect and abort attacking existing programs.
سؤال
One of the restrictions on the content of shellcode is that it has to be _______,which means that it cannot contain any absolute address referring to itself.
سؤال
A ________ is a condition where more input is placed into a buffer or data holding area than the capacity allocated and thus overwrites other information.
سؤال
_______ was one of the earliest operating systems written in a high-level language.
سؤال
The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.
سؤال
The _________ aims to provide useful information to people who perform penetration testing,IDS signature development,and exploit research.

A)Metasploit Project
B)Manhattan Project
C)Levy Project
D)RAD Project
سؤال
_______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.

A)Buffer
B)Position independent
C)Run-time
D)Compile-time
سؤال
At the basic machine level,all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor's registers or in ________.
سؤال
Memory is requested from the ______ by programs for use in dynamic data structures,such as linked lists of records.

A)shell
B)heap
C)address space
D)ROM
سؤال
______ defenses aim to harden programs to resist attacks in new programs.
سؤال
A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.

A)guard pages
B)library functions
C)shellcodes
D)MMUs
سؤال
The _______ exploited a buffer overflow in Microsoft SQL Server 2000.

A)Morris Internet Worm
B)Code Red Worm
C)Sasser Worm
D)Slammer Worm
سؤال
_________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.

A)Stack buffers
B)Guard pages
C)Compile-time defenses
D)Library functions
سؤال
In 2004 the ________ exploited a buffer overflow in Microsoft Windows 2000/XP Local Security Authority Subsystem Service.

A)Morris Internet Worm
B)Code Red Worm
C)Sasser Worm
D)Slammer Worm
سؤال
Stackshield,Return Address Defender and ________ are GCC compiler extensions that insert additional function entry and exit code.
سؤال
Randomizing the allocation of memory on the heap makes the possibility of predicting the address of targeted buffers extremely difficult,thus thwarting the successful execution of some __________ attacks.

A)vulnerability
B)heap overflow
C)MMU
D)stack overflow
سؤال
________ involve buffers located in the program's global (or static)data area.

A)Heap overflows
B)Stack buffer overflows
C)Position overflows
D)Global Data Area Overflows
سؤال
The _________ project produces a free,multiplatform 4.4BSD-based UNIX-like operating system.
سؤال
A _______ overflow occurs when the targeted buffer is located on the stack,usually as a local variable in a function's stack frame.
سؤال
An essential component of many buffer overflow attacks is the transfer of execution to code,known as _______,supplied by the attacker and often saved in the buffer being overflowed.

A)NOP code
B)stack code
C)heap code
D)shellcode
سؤال
A _________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.
سؤال
In 1996 ________ published "Smashing the Stack for Fun and Profit" in Phrack magazine,giving a step-by-step introduction to exploiting stack-based buffer overflow vulnerabilities.
سؤال
________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred,but due to a coding error,allows just one more byte to be copied than there is space available.
سؤال
The attacker can specify the return address used to enter code as a location somewhere in the run of NOPs,which is called a NOP ______.
سؤال
_______ can be placed between stack frames or between different allocations on the heap to provide further protection against stack and heap overflow attacks,but at cost in execution time supporting the large number of page mappings necessary.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Buffer Overflow
1
Buffer overflow attacks result from careless programming in
applications.
True
2
The buffer overflow type of attack is one of the least commonly seen
attacks.
False
3
The first widely used occurrence of the buffer overflow attack was the _______.

A)Code Red Worm
B)Morris Internet Worm
C)Sasser Worm
D)Slammer Worm
B
4
The x86 Assembly Language Instruction NOP means _______.

A)no operation or do nothing instruction
B)call function at addr
C)software interrupt to access operating system function
D)no push value onto the stack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
Several of the items in the CWE/SANS Top 25 Most Dangerous
Software Errors list,Risky Resource Management category,are buffer
overflow variants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
The attacker is able to precisely specify the starting address of the
instructions in the shellcode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
A ______ is a structure where data are usually saved on the stack.

A)guard page
B)stack frame
C)heap
D)NOP sled
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
A stack buffer overflow attack is also referred to as ______.

A)stack smashing
B)stack framing
C)buffer overrunning
D)heap overflowing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
Shellcode is not specific to a particular processor architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
A stack overflow can result in some form of denial-of-service attack on
a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
A _______ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer.

A)shellcode
B)program overflow
C)buffer overflow
D)library function
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
C's designers placed much more emphasis on space efficiency and
performance considerations than on type safety.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
The JAVA programming language is extremely vulnerable to buffer
overflows.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
Buffer overflows can be found in a wide variety of programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
A successful buffer overflow attack results in the loss of the function
or service the attacked program provided.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
The only consequence of a buffer overflow attack is the possible
corruption of data used by the program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
The possibility of overwriting the saved frame pointer and return
address forms the core of a stack overflow attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
To exploit any type of buffer overflow the attacker needs to understand
how that buffer will be stored in the processes memory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
The responsibility is placed on the assembly language programmer to
ensure that the correct interpretation is placed on any saved data value.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
An effective method for protecting programs against classic stack
overflow attacks is to instrument the function entry and exit code to
setup and then check its sack frame for any evidence of corruption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
_______ defenses aim to detect and abort attacking existing programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
One of the restrictions on the content of shellcode is that it has to be _______,which means that it cannot contain any absolute address referring to itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
A ________ is a condition where more input is placed into a buffer or data holding area than the capacity allocated and thus overwrites other information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
_______ was one of the earliest operating systems written in a high-level language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
The _________ aims to provide useful information to people who perform penetration testing,IDS signature development,and exploit research.

A)Metasploit Project
B)Manhattan Project
C)Levy Project
D)RAD Project
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
_______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.

A)Buffer
B)Position independent
C)Run-time
D)Compile-time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
At the basic machine level,all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor's registers or in ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
Memory is requested from the ______ by programs for use in dynamic data structures,such as linked lists of records.

A)shell
B)heap
C)address space
D)ROM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
______ defenses aim to harden programs to resist attacks in new programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.

A)guard pages
B)library functions
C)shellcodes
D)MMUs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
The _______ exploited a buffer overflow in Microsoft SQL Server 2000.

A)Morris Internet Worm
B)Code Red Worm
C)Sasser Worm
D)Slammer Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
_________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.

A)Stack buffers
B)Guard pages
C)Compile-time defenses
D)Library functions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
In 2004 the ________ exploited a buffer overflow in Microsoft Windows 2000/XP Local Security Authority Subsystem Service.

A)Morris Internet Worm
B)Code Red Worm
C)Sasser Worm
D)Slammer Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
Stackshield,Return Address Defender and ________ are GCC compiler extensions that insert additional function entry and exit code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
Randomizing the allocation of memory on the heap makes the possibility of predicting the address of targeted buffers extremely difficult,thus thwarting the successful execution of some __________ attacks.

A)vulnerability
B)heap overflow
C)MMU
D)stack overflow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
________ involve buffers located in the program's global (or static)data area.

A)Heap overflows
B)Stack buffer overflows
C)Position overflows
D)Global Data Area Overflows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
The _________ project produces a free,multiplatform 4.4BSD-based UNIX-like operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
A _______ overflow occurs when the targeted buffer is located on the stack,usually as a local variable in a function's stack frame.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
An essential component of many buffer overflow attacks is the transfer of execution to code,known as _______,supplied by the attacker and often saved in the buffer being overflowed.

A)NOP code
B)stack code
C)heap code
D)shellcode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
A _________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
In 1996 ________ published "Smashing the Stack for Fun and Profit" in Phrack magazine,giving a step-by-step introduction to exploiting stack-based buffer overflow vulnerabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred,but due to a coding error,allows just one more byte to be copied than there is space available.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
The attacker can specify the return address used to enter code as a location somewhere in the run of NOPs,which is called a NOP ______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
_______ can be placed between stack frames or between different allocations on the heap to provide further protection against stack and heap overflow attacks,but at cost in execution time supporting the large number of page mappings necessary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.