Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A. Privilege escalation
B. Pivoting
C. Process affinityD. Buffer overflow
2 Comments on “Which of the following specifically describes the explo…”
Alexandersays:
“restricted areas of the OS”
As for me it is “Buffer Overflow”
2
11
meacsays:
Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
A buffer overflow is MEMORY (RAM) Related, and not OS related.A buffer overflow occurs when a program or process attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold. … Exploiting a buffer overflow allows an attacker to control or crash the process or to modify its internal variables
“restricted areas of the OS”
As for me it is “Buffer Overflow”
2
11
Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
A buffer overflow is MEMORY (RAM) Related, and not OS related.A buffer overflow occurs when a program or process attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold. … Exploiting a buffer overflow allows an attacker to control or crash the process or to modify its internal variables
So the answer is indeed : A- Privilege escalation
11
0