Answered step by step
Verified Expert Solution
Question
1 Approved Answer
select all that apply 5) With DEP defense enabled, which of the following becomes impossible? a) Overwriting the return address on the stack b) Injecting
select all that apply
5) With DEP defense enabled, which of the following becomes impossible? a) Overwriting the return address on the stack b) Injecting shellcode onto the stack and execute it by jumping to it c) Finding a useful gadget to jump to in Return-Oriented Programming (ROP) 6) Which defenses have been (partially) deployed in modern operating systems? a) Access control list b) ASLR c) Control-Flow Integrity (CFI) 7) Which are the reasons why blind ROP attack against a web server works despite the fact that all modern defenses are deployed? a) Web server forks a child process with the same address space layout every time to serve a new connection b) Stack canary value stays the same even if a guess is wrong c) The version of enabled ASLR does not provide sufficient randomness 8) How does the blind ROP attack determine if a code sequence contains the desired gadget (since it's blind)? a) It learns the address of the gadget by obtaining a copy of the binary beforehand b) It sets up the stack in special ways so that the detected gadget will be uniquely identifiable c) It leverages the feedback about whether a server has crashed or not
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started