Anomaly 34 - Trivia 06
Which of the following is a technique used in a buffer overflow attack to redirect the program's execution flow to malicious code injected by the attacker?
a) Code obfuscation - Not a bin attack
b) Integer overflow - This just makes a number negative or postive not touching control flow
c) Return-oriented programming (ROP) - We are trying to overwrite the return address
d) Cross-site scripting (XSS) - Not a bin attack
Last modified: 28 May 2024