19. Discussion
How to prevent stack overflow attack using bound checking?
Bound Checking when taking input from outside/untrusted source
Avoid vulnerable functions
19
21. Question Set
1. Explain stack overflow with proper example.
2. What is NOP? Why attackers use NOP instruction?
3. Explain the problem with small buffer size an attacker faces
to exploit the buffer? Provide a solution for it?
21