Adventure2024 Help

Anomaly 34 - Trivia 06

Which of the following is a technique used in a buffer overflow attack to redirect the program's execution flow to malicious code injected by the attacker?

a) Code obfuscation - Not a bin attack

b) Integer overflow - This just makes a number negative or postive not touching control flow

c) Return-oriented programming (ROP) - We are trying to overwrite the return address

d) Cross-site scripting (XSS) - Not a bin attack

Last modified: 28 May 2024