In most buffer overflow attacks, which of the following behavior should be expected?
A.
Shell code to exploit the buffer.
B.
A vulnerability used to overflow the buffer and an exploit used to run malicious software off of the stack.
C.
A single crafted packet to overflow the buffer and run malicious software.
D.
An exploit used to overflow the buffer and a vulnerability used to run malicious software off of the stack.
Explanation:
Explaination
What causes the buffer overflow condition? Broadly speaking, buffer overflow occurs anytime the program writes more information into the buffer than the space it has allocated in the memory. This allows an attacker to overwrite data that controls the program execution path and hijack the control of the program to execute the attacker’s code instead the process code.