Answered You can hire a professional tutor to get the answer.

QUESTION

Provide a 5 pages analysis while answering the following question: Stack and Buffer Attacks in Operating Systems. Prepare this assignment according to the guidelines found in the APA Style Guide. An a

Provide a 5 pages analysis while answering the following question: Stack and Buffer Attacks in Operating Systems. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. Buffer overflow vulnerability gives an attacker the option to generate and run a code. the code then attacks the vulnerable application allowing the user to define the term of bias on the application giving an attacker the option to control a system (Crispin Cowan 1999)

The first buffer attack was widely used by the Morris Worm in the year 1988. Afterward, malicious crackers discovered the vulnerability and designed ways to exploit the advantage of vulnerability attack on the system. In 1995, a buffer overflow was discovered in NCSA HTTPd 3 (this an open-source web server for nix systems) then published on the Bugtraq mailing list by Lopatic Thomas. The bug caused the system to crash. The server had MAX_STRING_LEN defined into 256 characters, such that when a user request was larger than 256, the server would crash. In the access process, a user request looked like a normal request and most of the users were not able to detect any error on the log file. The bug was later fixed by redefining the MAX_STRING_LEN to a bigger number.

In the year 1996, Aleph One a registered Acorn developer is best known for producing high-speed processor cards, published the ‘ Smashing The Stack The Stack For Fun And Profit’ in Phrack magazine showing the procedure of exploiting the stack-based buffer overflow vulnerabilities.

In the year 2001, a buffer overflow vulnerability was detected in Microsoft IIS 5.0 running on windows 2000 by Eye Digital Security. The vulnerability allowed a remote hacker to execute an arbitrary code on a targeted user by allowing the intruder to have full administrative control of the targeted computer. The gateway for the attackers was the internet printing protocol extension installed in windows 2000. To counteract this, a patch was made by Microsoft allowing windows 2000 users to patch from Microsoft.

Another historical buffer overflows happened2003 in the Microsoft SQL Server 2000 using a “Slammer worm”.&nbsp.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question