GXPN Exam Question 6

Which of the following techniques is commonly used to bypass Data Execution Prevention (DEP) on Windows systems?
Response:
  • GXPN Exam Question 7

    What does the term SEH (Structured Exception Handling) refer to in the context of Windows exploitation?
    Response:
  • GXPN Exam Question 8

    Which of the following techniques can be used to defeat stack canaries in a stack smashing exploit?
    Response:
  • GXPN Exam Question 9

    Which two techniques are commonly used to obfuscate shellcode?
    (Choose Two)
    Response:
  • GXPN Exam Question 10

    In Windows exploitation, which of the following is used to prevent the execution of shellcode on the stack?
    Response: