GXPN Exam Question 6
Which of the following techniques is commonly used to bypass Data Execution Prevention (DEP) on Windows systems?
Response:
Response:
GXPN Exam Question 7
What does the term SEH (Structured Exception Handling) refer to in the context of Windows exploitation?
Response:
Response:
GXPN Exam Question 8
Which of the following techniques can be used to defeat stack canaries in a stack smashing exploit?
Response:
Response:
GXPN Exam Question 9
Which two techniques are commonly used to obfuscate shellcode?
(Choose Two)
Response:
(Choose Two)
Response:
GXPN Exam Question 10
In Windows exploitation, which of the following is used to prevent the execution of shellcode on the stack?
Response:
Response:
