In addition to stack-based buffer overflow attacks (i.e., smashing the stack), heap overflows can also be exploited. Consider the following C code, which illustrates a heap overflow.
a. Compile and execute this program. What is printed?
b. Explain the results you obtained in part a.
c. Explain how a heap overflow might be exploited by Trudy.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here