Computer Science, asked by neelamlokesh5523, 6 months ago

In ___________ attack, malicious code is pushed into _______.

Answers

Answered by keyboardavro
1

Answer:

Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.

Explanation:

Answered by madhurachaudhari16
0
Answer: buffer-overflow, stack

Explanation: Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.
Similar questions