Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Shellcode / more advanced attacks [ 2 pages ] Try to explain how the shellcode example given to you works, cover the following points: How

Shellcode / more advanced attacks [2 pages]
Try to explain how the shellcode example given to you works, cover the following points:
How do you get the shellcode to work? E.g. padding or addresses required, how these are determined, what is happening when the exploit works. How can the padding be used to increase the chances of the shellcode running?
For the shellcode itself, describe how it works. You can start with an overview of each of the sections highlighted (each does a particular job). If you manage this then a more detailed analysis of the code can be given.
For each of the protection mechanisms discuss in the lectures how effective would they be in preventing this type of attack?
2
One method that can potentially be used by an attacker to bypass protection mechanisms that would stop traditional shellcode attacks is Return Oriented Programming (ROP).
What is ROP?
How does it work?
Which protection mechanisms is it likely to defeat? Why? Which protection mechanisms are likely to be effective?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions