Miscellaneous Quiz / DefenseExploitsandVuner

Random Miscellaneous Quiz

Can you name the DefenseExploitsandVuner?

Quiz not verified by Sporcle

Forced Order
Challenge
Share
Tweet
Embed
Score 0/26 Timer 10:00
hints
in a ___ generation attack, an attacker can underflow the heap memory allocated and overwrite the control block
format string attacks, mem/heap management attacks, etc. all example of:
A __ ____ vulnerability occurs when a security decision is based on a URL and not all of the URL representations are taken into account
function pointer overwriting is an example of a _ generation exploit in which overflowing the buffer overwrited the function pointer
Nestea IP frame, linux fileutils 'ls' command, and middleman printer proxt server linux attacks are example of ____ vulnerability attack
more generally, a ____ is whatever weakness in an overall system makes it open to attack.
URL encoding and canonicalization is an input validation failure (a __ generation exploit)
The C language starts array indices at zero, which is not always intuitive for beginning programmers. Lead to the ____ attack
Szor classifies vulnerabilities and exploits by ____
Before the patches to detect character encoding/canonicalization, the ___ worm used it to backpack into the root directory and use the cmd.exe to copy itself over the web to the se
input validation failures are examples of ___ generation exploits
format string attacks are examples of ___generation exploits
the 2002 worm know as ____ or ___ was very complex attack on heap buffer overflow vulnerabilities within the Apache web server
hints
in this attack, the attacker can alter the last byte of the saved EBP. thus when the vulnerable function returns, the calling function will now have a bogus stack frame
an attack that was designed to target a known vulnerability is a(n) ______ of that vulnerability
Off by one overflows, heap overflows, file pointer & function pointer overwriting: all examples of
you can overflow a buffer when the ___ ___ aren't checked at _______-
%C0%AF can be used to represent what in UTF-8 charset encoding
what comes ___ the buffer being overflowed determines what can be attacked
ultimately, this heap buffer overflow worm ran its own shellcode on the server system, with Apache privileges, when Apache executed a call to free()
___ converts URLs into a standard form
In a ___ attack, the virus writer knows that the ret address is on the stack frame at a known offset after last local variable on frame. ret addres can be changed to cause a ret to
The first generation in classifying vulnerabilities is:
the two input validation failures that are most important in the internet age:
____ is the most common exploit. they're easy to guard against yet remain most common code vulnerability
This is often used to refer only to vunerable code in an OS or applications

You're not logged in!

Compare scores with friends on all Sporcle quizzes.
Sign Up with Email
OR
Log In

You Might Also Like...

Show Comments

Extras

Top Quizzes Today


Score Distribution

Your Account Isn't Verified!

In order to create a playlist on Sporcle, you need to verify the email address you used during registration. Go to your Sporcle Settings to finish the process.