SlideShare a Scribd company logo
1 of 2
Ted considers himself a skillful hacker. He has devised a way to replace the existing startup
programs between the moment that the system boots yet before the system actually executes
these programs. He believes that if he can perfect his attack, he can gain control of the system.
What type of attack is described here?
A. Synchronous attack
B. TOC/TOU attack
C. DCOM attack
D. Smurf attack
Solution
The correct answer is B . TOC/TOU attack
----------------------------------------------------------------------------------
Explanation :
This kind of attac is called "Time of Check/Time of Use (TOCTOU)" attack.
For suppose process X checked that a certain file exists and has certain attributes
before opening the file and do some necessary operations on the file.
By the time X opens it, the file could have been replaced with another file that was not the same
as before that was checked by the process X.
If the time gap between TOC and TOU is long can cause TOCTOU type of access to gain access
control over the system resoruces and malfunction the system properties.
Ted considers himself a skillful hacker- He has devised a way to repla.docx

More Related Content

Similar to Ted considers himself a skillful hacker- He has devised a way to repla.docx

Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacksSandun Perera
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registrysomutripathi
 
Security Policies
Security PoliciesSecurity Policies
Security Policiesphanleson
 
Introduction to Operating System (Important Notes)
Introduction to Operating System (Important Notes)Introduction to Operating System (Important Notes)
Introduction to Operating System (Important Notes)Gaurav Kakade
 
unit 4 Se linux.docx
unit 4 Se linux.docxunit 4 Se linux.docx
unit 4 Se linux.docxthdc
 

Similar to Ted considers himself a skillful hacker- He has devised a way to repla.docx (6)

Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
UNIX.ppt
UNIX.pptUNIX.ppt
UNIX.ppt
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
Introduction to Operating System (Important Notes)
Introduction to Operating System (Important Notes)Introduction to Operating System (Important Notes)
Introduction to Operating System (Important Notes)
 
unit 4 Se linux.docx
unit 4 Se linux.docxunit 4 Se linux.docx
unit 4 Se linux.docx
 

More from william842

Technical testing metrics fall into two major categories- What are the.docx
Technical testing metrics fall into two major categories- What are the.docxTechnical testing metrics fall into two major categories- What are the.docx
Technical testing metrics fall into two major categories- What are the.docxwilliam842
 
Taylor and Jordan are married and file a joint tax return claiming the.docx
Taylor and Jordan are married and file a joint tax return claiming the.docxTaylor and Jordan are married and file a joint tax return claiming the.docx
Taylor and Jordan are married and file a joint tax return claiming the.docxwilliam842
 
Terri Keys son Taylor was diagnosed with Tourettes syndrome- obsessive.docx
Terri Keys son Taylor was diagnosed with Tourettes syndrome- obsessive.docxTerri Keys son Taylor was diagnosed with Tourettes syndrome- obsessive.docx
Terri Keys son Taylor was diagnosed with Tourettes syndrome- obsessive.docxwilliam842
 
The accrual basis of accounting requires revenue to be recorded when t.docx
The accrual basis of accounting requires revenue to be recorded when t.docxThe accrual basis of accounting requires revenue to be recorded when t.docx
The accrual basis of accounting requires revenue to be recorded when t.docxwilliam842
 
The Access Point bridge needs its own DHCP server since it is on a dif.docx
The Access Point bridge needs its own DHCP server since it is on a dif.docxThe Access Point bridge needs its own DHCP server since it is on a dif.docx
The Access Point bridge needs its own DHCP server since it is on a dif.docxwilliam842
 
The account Unrealized Gain (Loss) on Trading Securities should be inc.docx
The account Unrealized Gain (Loss) on Trading Securities should be inc.docxThe account Unrealized Gain (Loss) on Trading Securities should be inc.docx
The account Unrealized Gain (Loss) on Trading Securities should be inc.docxwilliam842
 
The 2013 balance sheet for Hallbrook Industries- Inc-- is shown below.docx
The 2013 balance  sheet for Hallbrook Industries- Inc-- is shown below.docxThe 2013 balance  sheet for Hallbrook Industries- Inc-- is shown below.docx
The 2013 balance sheet for Hallbrook Industries- Inc-- is shown below.docxwilliam842
 
The -meta charset-utf-8- element specifies what scheme the web page us.docx
The -meta charset-utf-8- element specifies what scheme the web page us.docxThe -meta charset-utf-8- element specifies what scheme the web page us.docx
The -meta charset-utf-8- element specifies what scheme the web page us.docxwilliam842
 
Sustainability is an important ethical and environmental issue in purc.docx
Sustainability is an important ethical and environmental issue in purc.docxSustainability is an important ethical and environmental issue in purc.docx
Sustainability is an important ethical and environmental issue in purc.docxwilliam842
 
Thank you- Let Phi- R rightarrow S be a surjective homomorphism from t.docx
Thank you- Let Phi- R rightarrow S be a surjective homomorphism from t.docxThank you- Let Phi- R rightarrow S be a surjective homomorphism from t.docx
Thank you- Let Phi- R rightarrow S be a surjective homomorphism from t.docxwilliam842
 
class is intro to computers - studying environmental studies and law e.docx
class is intro to computers - studying environmental studies and law e.docxclass is intro to computers - studying environmental studies and law e.docx
class is intro to computers - studying environmental studies and law e.docxwilliam842
 
Common Stock Dividends Distributable is reported in the balance sheet-.docx
Common Stock Dividends Distributable is reported in the balance sheet-.docxCommon Stock Dividends Distributable is reported in the balance sheet-.docx
Common Stock Dividends Distributable is reported in the balance sheet-.docxwilliam842
 
column on the pericol tabie iOus Ciou f States that the properties of.docx
column on the pericol tabie iOus Ciou f States that the properties of.docxcolumn on the pericol tabie iOus Ciou f States that the properties of.docx
column on the pericol tabie iOus Ciou f States that the properties of.docxwilliam842
 
Coby has been working on a research paper about poverty in America- In.docx
Coby has been working on a research paper about poverty in America- In.docxCoby has been working on a research paper about poverty in America- In.docx
Coby has been working on a research paper about poverty in America- In.docxwilliam842
 
Cloud Computing Theory and Practice chapter 2 problem 7 Tuple-spaces c.docx
Cloud Computing Theory and Practice chapter 2 problem 7 Tuple-spaces c.docxCloud Computing Theory and Practice chapter 2 problem 7 Tuple-spaces c.docx
Cloud Computing Theory and Practice chapter 2 problem 7 Tuple-spaces c.docxwilliam842
 
Clint is Marilyn-'s supervisor- Marilyn is a dedicated part-time emplo.docx
Clint is Marilyn-'s supervisor- Marilyn is a dedicated part-time emplo.docxClint is Marilyn-'s supervisor- Marilyn is a dedicated part-time emplo.docx
Clint is Marilyn-'s supervisor- Marilyn is a dedicated part-time emplo.docxwilliam842
 
Cleary- Wasser- and Nolan formed a partnership on January 1- 2010- wit.docx
Cleary- Wasser- and Nolan formed a partnership on January 1- 2010- wit.docxCleary- Wasser- and Nolan formed a partnership on January 1- 2010- wit.docx
Cleary- Wasser- and Nolan formed a partnership on January 1- 2010- wit.docxwilliam842
 
Classify each of the compounds as Soluble (s) or Not Soluble (ns)-.docx
Classify each of the compounds as Soluble (s) or Not Soluble (ns)-.docxClassify each of the compounds as Soluble (s) or Not Soluble (ns)-.docx
Classify each of the compounds as Soluble (s) or Not Soluble (ns)-.docxwilliam842
 
Choose the statement below that is TRUE- Choose the statement below th.docx
Choose the statement below that is TRUE- Choose the statement below th.docxChoose the statement below that is TRUE- Choose the statement below th.docx
Choose the statement below that is TRUE- Choose the statement below th.docxwilliam842
 
Choose the correct format for a journal article with a DOI and more th.docx
Choose the correct format for a journal article with a DOI and more th.docxChoose the correct format for a journal article with a DOI and more th.docx
Choose the correct format for a journal article with a DOI and more th.docxwilliam842
 

More from william842 (20)

Technical testing metrics fall into two major categories- What are the.docx
Technical testing metrics fall into two major categories- What are the.docxTechnical testing metrics fall into two major categories- What are the.docx
Technical testing metrics fall into two major categories- What are the.docx
 
Taylor and Jordan are married and file a joint tax return claiming the.docx
Taylor and Jordan are married and file a joint tax return claiming the.docxTaylor and Jordan are married and file a joint tax return claiming the.docx
Taylor and Jordan are married and file a joint tax return claiming the.docx
 
Terri Keys son Taylor was diagnosed with Tourettes syndrome- obsessive.docx
Terri Keys son Taylor was diagnosed with Tourettes syndrome- obsessive.docxTerri Keys son Taylor was diagnosed with Tourettes syndrome- obsessive.docx
Terri Keys son Taylor was diagnosed with Tourettes syndrome- obsessive.docx
 
The accrual basis of accounting requires revenue to be recorded when t.docx
The accrual basis of accounting requires revenue to be recorded when t.docxThe accrual basis of accounting requires revenue to be recorded when t.docx
The accrual basis of accounting requires revenue to be recorded when t.docx
 
The Access Point bridge needs its own DHCP server since it is on a dif.docx
The Access Point bridge needs its own DHCP server since it is on a dif.docxThe Access Point bridge needs its own DHCP server since it is on a dif.docx
The Access Point bridge needs its own DHCP server since it is on a dif.docx
 
The account Unrealized Gain (Loss) on Trading Securities should be inc.docx
The account Unrealized Gain (Loss) on Trading Securities should be inc.docxThe account Unrealized Gain (Loss) on Trading Securities should be inc.docx
The account Unrealized Gain (Loss) on Trading Securities should be inc.docx
 
The 2013 balance sheet for Hallbrook Industries- Inc-- is shown below.docx
The 2013 balance  sheet for Hallbrook Industries- Inc-- is shown below.docxThe 2013 balance  sheet for Hallbrook Industries- Inc-- is shown below.docx
The 2013 balance sheet for Hallbrook Industries- Inc-- is shown below.docx
 
The -meta charset-utf-8- element specifies what scheme the web page us.docx
The -meta charset-utf-8- element specifies what scheme the web page us.docxThe -meta charset-utf-8- element specifies what scheme the web page us.docx
The -meta charset-utf-8- element specifies what scheme the web page us.docx
 
Sustainability is an important ethical and environmental issue in purc.docx
Sustainability is an important ethical and environmental issue in purc.docxSustainability is an important ethical and environmental issue in purc.docx
Sustainability is an important ethical and environmental issue in purc.docx
 
Thank you- Let Phi- R rightarrow S be a surjective homomorphism from t.docx
Thank you- Let Phi- R rightarrow S be a surjective homomorphism from t.docxThank you- Let Phi- R rightarrow S be a surjective homomorphism from t.docx
Thank you- Let Phi- R rightarrow S be a surjective homomorphism from t.docx
 
class is intro to computers - studying environmental studies and law e.docx
class is intro to computers - studying environmental studies and law e.docxclass is intro to computers - studying environmental studies and law e.docx
class is intro to computers - studying environmental studies and law e.docx
 
Common Stock Dividends Distributable is reported in the balance sheet-.docx
Common Stock Dividends Distributable is reported in the balance sheet-.docxCommon Stock Dividends Distributable is reported in the balance sheet-.docx
Common Stock Dividends Distributable is reported in the balance sheet-.docx
 
column on the pericol tabie iOus Ciou f States that the properties of.docx
column on the pericol tabie iOus Ciou f States that the properties of.docxcolumn on the pericol tabie iOus Ciou f States that the properties of.docx
column on the pericol tabie iOus Ciou f States that the properties of.docx
 
Coby has been working on a research paper about poverty in America- In.docx
Coby has been working on a research paper about poverty in America- In.docxCoby has been working on a research paper about poverty in America- In.docx
Coby has been working on a research paper about poverty in America- In.docx
 
Cloud Computing Theory and Practice chapter 2 problem 7 Tuple-spaces c.docx
Cloud Computing Theory and Practice chapter 2 problem 7 Tuple-spaces c.docxCloud Computing Theory and Practice chapter 2 problem 7 Tuple-spaces c.docx
Cloud Computing Theory and Practice chapter 2 problem 7 Tuple-spaces c.docx
 
Clint is Marilyn-'s supervisor- Marilyn is a dedicated part-time emplo.docx
Clint is Marilyn-'s supervisor- Marilyn is a dedicated part-time emplo.docxClint is Marilyn-'s supervisor- Marilyn is a dedicated part-time emplo.docx
Clint is Marilyn-'s supervisor- Marilyn is a dedicated part-time emplo.docx
 
Cleary- Wasser- and Nolan formed a partnership on January 1- 2010- wit.docx
Cleary- Wasser- and Nolan formed a partnership on January 1- 2010- wit.docxCleary- Wasser- and Nolan formed a partnership on January 1- 2010- wit.docx
Cleary- Wasser- and Nolan formed a partnership on January 1- 2010- wit.docx
 
Classify each of the compounds as Soluble (s) or Not Soluble (ns)-.docx
Classify each of the compounds as Soluble (s) or Not Soluble (ns)-.docxClassify each of the compounds as Soluble (s) or Not Soluble (ns)-.docx
Classify each of the compounds as Soluble (s) or Not Soluble (ns)-.docx
 
Choose the statement below that is TRUE- Choose the statement below th.docx
Choose the statement below that is TRUE- Choose the statement below th.docxChoose the statement below that is TRUE- Choose the statement below th.docx
Choose the statement below that is TRUE- Choose the statement below th.docx
 
Choose the correct format for a journal article with a DOI and more th.docx
Choose the correct format for a journal article with a DOI and more th.docxChoose the correct format for a journal article with a DOI and more th.docx
Choose the correct format for a journal article with a DOI and more th.docx
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 

Ted considers himself a skillful hacker- He has devised a way to repla.docx

  • 1. Ted considers himself a skillful hacker. He has devised a way to replace the existing startup programs between the moment that the system boots yet before the system actually executes these programs. He believes that if he can perfect his attack, he can gain control of the system. What type of attack is described here? A. Synchronous attack B. TOC/TOU attack C. DCOM attack D. Smurf attack Solution The correct answer is B . TOC/TOU attack ---------------------------------------------------------------------------------- Explanation : This kind of attac is called "Time of Check/Time of Use (TOCTOU)" attack. For suppose process X checked that a certain file exists and has certain attributes before opening the file and do some necessary operations on the file. By the time X opens it, the file could have been replaced with another file that was not the same as before that was checked by the process X. If the time gap between TOC and TOU is long can cause TOCTOU type of access to gain access control over the system resoruces and malfunction the system properties.