Introduction
Invalidated inputs are always a big threat to website security. In this activity, you will discuss the popular buffer overflow attack and its countermeasures.
Instructions
Before starting with the assignment, refer to the following website:
A Shellcode: The Payload
https://www.tenouk.com/Bufferoverflowc/Bufferoverflow5.html
Now, consider the following C program used for authenticating a user to log into the software. The hacker bypasses the authentication and logs into the software. Analyze the following program to identify the possible cause of the breach in the code.
Respond to the following:
Examine the above code and discuss how it is vulnerable to Buffer Overflow Attack.
Explain how hackers inject shellcodes into the system using a Buffer Overflow Attack.