This shows you the differences between two versions of the page.
cs-465:hw11-stacksmash [2016/10/25 17:28] seamons created |
cs-465:hw11-stacksmash [2016/10/25 17:29] (current) seamons |
||
---|---|---|---|
Line 7: | Line 7: | ||
* What are two different ways to succeed at a stack smashing attack described in the paper? | * What are two different ways to succeed at a stack smashing attack described in the paper? | ||
* How does the paper recommend you find a buffer overflow vulnerability? Do you know of any other ways to find this vulnerability? | * How does the paper recommend you find a buffer overflow vulnerability? Do you know of any other ways to find this vulnerability? | ||
+ | * What two questions do you have about stack smashing attacks that you can bring to class? | ||