CSS important question answer , css notes
CSS : motivationbank.net






Question:- Discuss control hijacking in computer security . 

Answer :-

1. Hijacking is a type of network security attack in which the attacker takes control of a communication .


 2.  In hijacking ( also known as a man in the middle attack ) , the perpetrato takes control of an established connection while it is in progress . 


3. The attacker intercepts messages in a public key exchange and then retransmits them , substituting their own public key for the requested one , so that the two original parties still appear to be communicating with each other directly . 


4. The attacker uses a program that appears to be the server to the client and appears to be the client to the server .


 5. This attack may be used simply to gain access to the messages , or to enable the attacker to modify them before retransmitting them . 


6. Attacker's goal in control hijacking :  

Takeover target machine ( for example web server ) br Execute arbitrary code on target by hijacking application control flow


 There are three types of control hijacking in computer security :


1. Buffer overflow attacks 

2. Integer overflow attacks

3. Format string vulnerabilities



Question :- 

Describe briefly overflow attack . 

                      OR 

What is control hijacking with an example ? Explain the term of buffer overflow in control hijacking .

Answer :-  

Buffer overflow in Control Hijacking :


1. Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another . 


2. A buffer overflow ( or buffer overrun ) occurs when the volume of data exceeds the storage capacity of the memory buffer . 


3. As a result , the program attempting to write the data to the buffer overwrites adjacent memory locations .  


4. Attackers exploit buffer overflow issues by overwriting the memory of an application . 


5 . This changes the execution path of the program , triggering a response that damages files or exposes private information



Which of the following is an example of controlled hijacking



Post a Comment

हमें बताइए , आपको यह पोस्ट कैसा लगा ??