Are you studying for the CEH certification?

Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.

Upgrade Account

In a buffer-overflow attack, the attacker either manually sends strings of information to the victim Linux machine or writes a script to do so. These strings contain the following: (select all that are correct)

A pointer to the start of the malicious code in the memory buffer.

Malicious code to replace the attacked process. For example, exec ("/bin/sh") creates a shell command prompt.

None of these

NOP

Explanation

Buffer Overflows

Video Training

Train with Skillset and pass your certification exam. Faster. Guaranteed.

Directory

Skillset helps you pass your certification exam.

Contributions and Interactions
Practice Questions

Study thousands of practice questions that organized by skills and ranked by difficulty.

Contributions and Interactions
Personalized Training

Create a tailored training plan based on the knowledge you already possess.

Training Video Selector
Exam Readiness

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Get A Free Skillset Account