Traditionally the function of __________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program. A. sh
A. shellcode B. C coding
C. assembly language D. all the above
A. shellcode
Computer Science & Information Technology
You might also like to view...
Which of the following command-line utilities is capable of making a forensic image of a hard disk, assuming that a valid form of write-protection is in place?
a. COPY b. XCOPY c. MOVE d. DD
Computer Science & Information Technology
Regular expressions are used in:
a. text editors b. online forms c. IDEs d. all of the above
Computer Science & Information Technology