100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEPT Exam 2 (2024) – All Questions & Answers (100% Correct) R167,74   Add to cart

Exam (elaborations)

CEPT Exam 2 (2024) – All Questions & Answers (100% Correct)

 35 views  0 purchase
  • Course
  • Cept
  • Institution
  • Cept

CEPT Exam 2 (2024) – All Questions & Answers (100% Correct) CEPT Exam 2 (2024) – All Questions & Answers (100% Correct) What protocol does Moon bouncing use? - ANSWER - ICMP What format string specifier is used to overwrite an address? - ANSWER - %n Where can buffer overflows occur? -...

[Show more]

Preview 2 out of 5  pages

  • March 1, 2024
  • 5
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • Cept
  • Cept
avatar-seller
CEPT Exam 2 (2024) – All Questions &
Answers (100% Correct)
What protocol does Moon bouncing use? - ANSWER - ICMP
What format string specifier is used to overwrite an address? - ANSWER - %n
Where can buffer overflows occur? - ANSWER - heap, stack, kernel memory
Why are fuzzers popular? - ANSWER - They are adept at finding buffer overrun possibilities.
Why are format string vulnerabilities not as widely exploited? - ANSWER - They are newer, less-known
What does the EBP contain - ANSWER - The Electronic Base Pointer
What does the POP instruction do? - ANSWER - Takes the value pointed to by the ESP
and places it in a specific location.
What does the GetDriveA API do? - ANSWER - Returns the drive currently inserted into
the computer.
What does bind shell shellcode do? - ANSWER - Opens a socket and connects back to the attacker.
How can an IPS be attacked? - ANSWER - By creating a flood of false alerts.
Fuzzers can find what? - ANSWER - Vulnerabilities you were not looking for.
How does passive traffic observation recon work? - ANSWER - Observing network traffic and determining OS versions.
How can you fill the EAX with nulls? - ANSWER - XOR EAX, EAX
What tool can be used to attack IPS systems? - ANSWER - Sneeze
Why is the CALL instruction important? - ANSWER - It saves the EIP onto the stack.
Is attaching a memory resident debugger part of the three stages of software cracking? - ANSWER - No.
What does the %s format string do? - ANSWER - Allows you to write memory to an arbitrary location. What does the EIP register point to? - ANSWER - The next instruction to be executed.
What do Off-by-one overflows overwrite? - ANSWER - The saved EBP.
How do stack overflows work? - ANSWER - Overwriting the saved EIP on the stack with
one that points to an address with shellcode.
What is IDA Pro? - ANSWER - A popular disassembler.
Can DLL's be executable modules? - ANSWER - Yes
How can yo write shellcode that will evade an IDS? - ANSWER - Obsucring the NOP sled.
Are Fault Injection and Fuzzing essentially the same thing? - ANSWER - Yes
What do debuggers do? - ANSWER - Allow you to modify the runtime nature of a program.
What are software breakpoints set with? - ANSWER - 0xCC
What is the best way to to fill a register with nulls when writing shellcode? - ANSWER - Add a non-null value to the regsiter, then subtract the same value from the register.
Can PSExec execute programs remotely? - ANSWER - Yes
What is the hex representation for the ASCII characer A? - ANSWER - 41
What do application breakpointing API calls allow you to do when reverse engineering a
Windows application? - ANSWER - Halt a program when user input is received.
What does IDA Pro use to determine which compiler created a program? - ANSWER - Start Code
What is an encrypted version of netcat - ANSWER - cryptcat
What is Metasploit - ANSWER - An exploitation framework
What are one of the big problems with IDS? - ANSWER - False positivies
Theopcode for NOP is: - ANSWER - x90
Why can you overwrite subsequent blocks in heap memory? - ANSWER - It is contiguous, if one block does not do proper bounds checking.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller conceptialresearchers. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R167,74. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73918 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Start selling
R167,74
  • (0)
  Buy now