PrepAway - Latest Free Exam Questions & Answers

Tag: Buffer Overflow

From the options below, choose the exploit against which this rule applies?

Study the snort rule given:

alert tcp $EXTERNAL_NET any -> $HOME_NET 135 (msg:”NETBIOS DCERPC ISystemActivator bind attempt”; flow:to_server,established; content:”|05|”; distance:0; within:1; content:”|0b|”; distance:1; within:1; byte_test:1,&,1,0,relative; content:”|A0 01 00 00 00 00 00 00 C0 00 00 00 00 00 00 46|”; distance:29; within:16; reference:cve,CAN-2003-0352; classtype:attempted-admin; sid:2192; rev:1;)

alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:”NETBIOS SMB DCERPC ISystemActivator bind attempt”; flow:to_server,established; content:”|FF|SMB|25|”; nocase; offset:4; depth:5; content:”|26 00|”; distance:56; within:2; content:”|5c 00|P|00|I|00|P|00|E|00 5c 00|”; nocase; distance:5; within:12; content:”|05|”; distance:0; within:1; content:”|0b|”; distance:1; within:1; byte_test:1,&,1,0,relative; content:”|A0 01 00 00 00 00 00 00 C0 00 00 00 00 00 00 46|”; distance:29; within:16; reference:cve,CAN-2003-0352; classtype:attempted-admin; sid:2193; rev:1;)

From the options below, choose the exploit against which this rule applies?

What will this code accomplish?

Ursula is a network security analyst as well as a web developer working on contract for a marketing firm in St. Louis. Ursula has been hired on to help streamline the company’s website and ensure it meets accessibility laws for that state. After completing all the work that was asked, the marketing firm terminates Ursula’s service and does not pay the rest of the money that is owed to her.Right before she is asked to leave, Ursula writes a small application with the following code inserted into it.
What will this code accomplish?

Which of the following buffer overflow exploits are related to Microsoft IIS web server?

Which of the following buffer overflow exploits are related to Microsoft IIS web server? (Choose three)

What is the hexadecimal value of NOP instruction?

You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c
char shellcode[] =
“x31xc0xb0x46x31xdbx31xc9xcdx80xebx16x5bx31xc0”
“x88x43x07x89x5bx08x89x43x0cxb0x0bx8dx4bx08x8d”
“x53x0cxcdx80xe8xe5xffxffxffx2fx62x69x6ex2fx73”
“x68”;
What is the hexadecimal value of NOP instruction?

The two popular types of buffer overflows prevalent today are:

Buffer overflows are one of the top flaws for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold. The two popular types of buffer overflows prevalent today are:

What is the probable cause of Bill's problem?

Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill’s problem?


Page 1 of 212