gibson: privilege escalation --The process of gaining elevated rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges.
buffer overflow--- An error that occurs when an application receives more input, or different input, than it expects. It exposes system memory that is normally inaccessible.
I think it depends on how you define "areas of the OS". Memory isn't necessarily part of the OS, but the OS runs in memory. As such, gaining access to restricted areas in the memory ultimately provides access to restricted areas of the OS. It's crap wording; hard to say what angle they're looking for. Both A and D are equally correct to me.
this discussion session is more confusing. I wish these material providers hire a professor who can explain every answer instead of every sharing their limited thoughts and knowledge
Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
D. Buffer Overflows always require an INTERACTIVE app issuing a prompt which fails to check for response length.
with Privilege Escalation hackers can use a NON-INTERACTIVE program (application) to gain access.
Privilege escalation happens when a malicious user exploits a bug, design flaw, or configuration error in an APPLICATION (either a batch program or an interactive program) or OPERATING SYSTEM utility program to gain elevated access to resources that should normally be unavailable to that user.
They expand their privileges by taking over another account and misusing the legitimate privileges granted to the other user - or they attempt to gain more permissions or access with an existing ACCOUNT they have compromised.
https://www.cynet.com/cyber-attacks/privilege-escalation/
D. A buffer overflow occurs a hacker appends their executable code or commands to the end of a reply to a prompt from an interactive app - and the reply exceeds the expected length, causing the code or commands to execute within restricted areas of memory. The OS segments its memory, confining each executing task with an authorized area. The buffer overflow causes an intrusion into unauthorized/restricted memory.
Not really sure how the answer should be A.Privilege escalation.? I think it answer should be D. "exploitation of an interactive process to access otherwise restricted areas of the OS".
It is A because that is how you gain higher access.
upvoted 1 times
...
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Aarongreene
3 years, 9 months agodb444
4 years agoNot_My_Name
4 years, 2 months agoShahrukh__s
4 years, 2 months agoHanzero
4 years, 3 months agomlonz
4 years, 5 months agoXhibit
4 years, 5 months agokdce
4 years, 6 months agoMelvinJohn
4 years, 7 months ago000_000
4 years, 8 months agoMelvinJohn
4 years, 9 months agochakpam
4 years, 9 months agoJasonbelt
4 years, 5 months ago