Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

select all that apply 5) With DEP defense enabled, which of the following becomes impossible? a) Overwriting the return address on the stack b) Injecting

select all that apply

image text in transcribed

5) With DEP defense enabled, which of the following becomes impossible? a) Overwriting the return address on the stack b) Injecting shellcode onto the stack and execute it by jumping to it c) Finding a useful gadget to jump to in Return-Oriented Programming (ROP) 6) Which defenses have been (partially) deployed in modern operating systems? a) Access control list b) ASLR c) Control-Flow Integrity (CFI) 7) Which are the reasons why blind ROP attack against a web server works despite the fact that all modern defenses are deployed? a) Web server forks a child process with the same address space layout every time to serve a new connection b) Stack canary value stays the same even if a guess is wrong c) The version of enabled ASLR does not provide sufficient randomness 8) How does the blind ROP attack determine if a code sequence contains the desired gadget (since it's blind)? a) It learns the address of the gadget by obtaining a copy of the binary beforehand b) It sets up the stack in special ways so that the detected gadget will be uniquely identifiable c) It leverages the feedback about whether a server has crashed or not

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions