While investigating a claim of a user downloading illegal material, the investigator goes through
the files on the suspect’s workstation. He comes across a file that is just called “file.txt” but when
he opens it, he finds the following:
What can he infer from this file?

A.
A picture that has been renamed with a .txt extension
B.
An encrypted file
C.
An encoded file
D.
A buffer overflow
This is a buffer overflow exploit with its “payload” in hexadecimal format.