header bg

Scan QR code or get instant email to install app

Question:

Trevor is reviewing the logs for his company's web applications. He finds what he thinks is a breach. After further investigation, it appears as if the attacker executed code from one of the libraries the application uses, code that is no longer even used by the application. Which of the following BEST describes this attack?

A Code reuse attack.
explanation

In a code reuse attack, the attacker executes code that is meant for some other purposes. In many cases, this can be old code that is no longer even used (dead code), even if that code is in a third-party library. A buffer overflow occurs when too much data is sent to a buffer. For example, say a buffer is designed to hold 10 bytes, and it is sent 100 bytes, causing the additional data to be put into unexpected memory locations. A denial-of-service (DoS) attack is meant to make a service or system unavailable to legitimate users. Session hijacking involves taking over an existing authenticated session.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*