What us control hijacking? Explain
Answers
Answered by
1
Answer:
US CONTROL HIJACKING
Explanation:
A control-hijacking attack overwrites some data structures in a victim program that affect its control flow, and eventually hijacks the control of the program and possibly the underlying system. ... It causes some of that data to leak out into other buffers, which can corrupt or overwrite whatever data they were holding.
HOPE IT WILL HELP YOU
Answered by
0
Control hijacking attacks
Attacker’s goal:
! Take over target machine (e.g. web server)
" Execute arbitrary code on target by
hijacking application control flow
This lecture: three examples.
! Buffer overflow attacks
! Integer overflow attacks
! Format string vulnerabilities
What is needed
Understanding C functions and the stack
Some familiarity with machine code
Know how systems calls are made
The exec() system call
Attacker needs to know which CPU and OS are running on
the target machine:
! Our examples are for x86 running Linux
! Details vary slightly between CPUs and OSs:
" Little endian vs. big endian (x86 vs. Motorola)
" Stack Frame structure (Unix vs. Windows)
" Stack growth direction
Similar questions
English,
5 months ago
Math,
5 months ago
Computer Science,
5 months ago
English,
11 months ago
Business Studies,
11 months ago
Math,
1 year ago
English,
1 year ago