Karten 19 Karten
Lernende 0 Lernende
Sprache English
Stufe Universität
Erstellt / Aktualisiert 24.06.2019 / 24.06.2019
Lizenzierung Keine Angabe
0 Exakte Antworten 19 Text Antworten 0 Multiple Choice Antworten
Fenster schliessen

What exploit mitigations do you know?

  • (ASCII Armor)
  • Stack Canary 
  • ASLR [Address Space Layout Ranfomization]
    • PIE
  • DEP [Data Exection Prevention]
Fenster schliessen

How can you do to write secure code?

  • Use secure libraries
  • Perfom Static Analysis of the source code
  • Perform Dynamic Analysis of programs
  • Perform fuzzing of input vectors
  • Have a secure development lifecycle (SDL)
  • Manual source code reviews
Fenster schliessen

What two types of protection can be put in place by sysadmins?

  • Compile Time Protection
  • Runtime Protection
Fenster schliessen

What is required to create an exploit?

  • Executable Shellcode
    • Aka "Hacker instructions"
  • The distance form the buffer to the SIP (Stored Instruction Pointer)
    • Offset for the overflow
  • The address of shellcode
    • in memory of the target process
Fenster schliessen

Name two compile time mitigations.

 Compile time mitigations:

  • Stack canaries
  • PIE


Fenster schliessen

Name some runtime mitigations.

Runtime mitigations:

  • ASLR
  • DEP
  • ASCII Armor
Fenster schliessen

Where is the stack cannary located on the stack?

Lizenzierung: Keine Angabe

The stack canary is below the SIP (Stored Instruction Pointer) and the SBP [SFP] (Stored Base Pointer, Stored Frame Pointer)

Fenster schliessen

   what does DEP stand for and what does it do?

DEP (Data Execution Prevention)

DEP makes the stack not executable.