It can then execute the code in that file, just as if the programmer had written it as part of the original program.
然后,它可以执行该文件中的代码,就好像程序设计人员已经将代码作为原始程序中一部分写入了。
If the attacker is able to fill in just enough space with dummy data (i.e., NOPs) and then add a bit of malicious code or a value, the program will execute the malicious code or use that new value.
如果黑客能够用伪数据(也就是,NOP)填充足够的空间,然后添加一点恶意代码或值,那么程序将执行恶意代码或使用新值。
While writing a user space program to execute a system call is the "proper" way to do it, when you just want to test a system call module, it's annoying to have to write an additional program first.
当你想去测试一个系统调用模块时,编写一个用户空间的程序来执行一个系统调用是种“正规”的方法。但首先要编写额外的程序,这是恼人的事情。怎样才可以执行一个系统调用而又不用编写用户空间的程序呢?
应用推荐