Hands – On Ethical Hacking and Network Defense 3 rd edition Case Project 8-2: De
ID: 3806382 • Letter: H
Question
Hands – On Ethical Hacking and Network Defense 3rd edition
Case Project 8-2: Detecting Unauthorized Applications
In conducting a review of the Oss running on the Alexander Rocco network, you detect a program that appears to be unauthorized. No one in the department knows how this program got on the Linux computer. The department manager thinks the program was installed before his start date three years ago. When you review the program’s source code, you discover that it contains a buffer overflow vulnerability. Based on this information, write a report to the IT manager stating what course of action should be taken and listing recommendations for management.
Explanation / Answer
To,
The IT Manager
While conducting a review of the Oss running on the Alexander Rocco network, I detect a program that appears to be unauthorized also the department manager provide me information that the program was installed before his start date three years ago on my complete deep review i found that it contains a buffer overflow vulnerability which leads to overflow of data on a given memory these effects also leads to integer overflow Unicode overflow which csn indirectly affect the whole system so i suggest you sir please go through the issue and detect buffer overflows on stack-allocated variables, and preventing buffer overflows from causing misbehavior in the program and also from becoming serious vulnerabilities to securiety.
Thanking You
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.