0
0
Operating Systemsknowledge~10 mins

Buffer overflow attacks in Operating Systems - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the type of attack where extra data overwrites memory.

Operating Systems
The attack that exploits writing beyond buffer limits is called a [1] attack.
Drag options to blanks, or click blank then click option'
APhishing
BSQL injection
CBuffer overflow
DCross-site scripting
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing buffer overflow with SQL injection.
Thinking phishing is related to memory attacks.
2fill in blank
medium

Complete the sentence to explain what buffer overflow attacks exploit.

Operating Systems
Buffer overflow attacks exploit [1] in a program's memory handling.
Drag options to blanks, or click blank then click option'
Avulnerabilities
Bnetwork speed
Cuser permissions
Dencryption
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing network speed or encryption, which are unrelated.
Confusing user permissions with memory handling.
3fill in blank
hard

Fix the error in the statement about buffer overflow consequences.

Operating Systems
Buffer overflow attacks can cause [1] of program control to execute malicious code.
Drag options to blanks, or click blank then click option'
Aoverwrite
Bgain
Ctransfer
Dloss
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'loss' or 'gain' which do not fit the context.
Selecting 'transfer' which is unrelated here.
4fill in blank
hard

Fill both blanks to describe a common buffer overflow prevention technique.

Operating Systems
One way to prevent buffer overflow is to use [1] checking and [2] randomization.
Drag options to blanks, or click blank then click option'
Abounds
Bmemory
Caddress space layout
Dnetwork
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing memory with bounds checking.
Choosing network which is unrelated to buffer overflow prevention.
5fill in blank
hard

Fill all three blanks to complete the description of buffer overflow attack steps.

Operating Systems
An attacker sends [1] input to overflow a [2], then overwrites the [3] to run malicious code.
Drag options to blanks, or click blank then click option'
Amalicious
Bbuffer
Creturn address
Dencrypted
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing encrypted input which is unrelated.
Confusing return address with buffer.