In ___________ attack, malicious code is pushed into _______.
Answers
Answered by
1
Answer:
Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.
Explanation:
Answered by
0
Answer: buffer-overflow, stack
Explanation: Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.
Explanation: Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.
Similar questions