Miscellaneous Quiz / DefenseExploitsandVuner

Random Miscellaneous Quiz

Can you name the DefenseExploitsandVuner?

Quiz not verified by Sporcle

Forced Order
Also try: 'B' First Names
Score 0/26 Timer 10:00
This is often used to refer only to vunerable code in an OS or applications
format string attacks, mem/heap management attacks, etc. all example of:
you can overflow a buffer when the ___ ___ aren't checked at _______-
function pointer overwriting is an example of a _ generation exploit in which overflowing the buffer overwrited the function pointer
____ is the most common exploit. they're easy to guard against yet remain most common code vulnerability
Before the patches to detect character encoding/canonicalization, the ___ worm used it to backpack into the root directory and use the cmd.exe to copy itself over the web to the se
A __ ____ vulnerability occurs when a security decision is based on a URL and not all of the URL representations are taken into account
format string attacks are examples of ___generation exploits
___ converts URLs into a standard form
In a ___ attack, the virus writer knows that the ret address is on the stack frame at a known offset after last local variable on frame. ret addres can be changed to cause a ret to
what comes ___ the buffer being overflowed determines what can be attacked
an attack that was designed to target a known vulnerability is a(n) ______ of that vulnerability
more generally, a ____ is whatever weakness in an overall system makes it open to attack.
Szor classifies vulnerabilities and exploits by ____
URL encoding and canonicalization is an input validation failure (a __ generation exploit)
in a ___ generation attack, an attacker can underflow the heap memory allocated and overwrite the control block
the 2002 worm know as ____ or ___ was very complex attack on heap buffer overflow vulnerabilities within the Apache web server
The C language starts array indices at zero, which is not always intuitive for beginning programmers. Lead to the ____ attack
input validation failures are examples of ___ generation exploits
in this attack, the attacker can alter the last byte of the saved EBP. thus when the vulnerable function returns, the calling function will now have a bogus stack frame
%C0%AF can be used to represent what in UTF-8 charset encoding
Off by one overflows, heap overflows, file pointer & function pointer overwriting: all examples of
ultimately, this heap buffer overflow worm ran its own shellcode on the server system, with Apache privileges, when Apache executed a call to free()
the two input validation failures that are most important in the internet age:
The first generation in classifying vulnerabilities is:
Nestea IP frame, linux fileutils 'ls' command, and middleman printer proxt server linux attacks are example of ____ vulnerability attack

You're not logged in!

Compare scores with friends on all Sporcle quizzes.
Sign Up with Email
Log In

You Might Also Like...

Show Comments


Top Quizzes Today

Score Distribution

Your Account Isn't Verified!

In order to create a playlist on Sporcle, you need to verify the email address you used during registration. Go to your Sporcle Settings to finish the process.