• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

What are two types of Windows memory-based protection measures that can be deployed to combat the use of shellcode? (Choose two.)

  • DEP
  • defender
  • ASLR
  • PowerShell
Explanation & Hint:

Two types of Windows memory-based protection measures that can be deployed to combat the use of shellcode are:

  1. DEP (Data Execution Prevention): DEP is a security feature that helps prevent damage from viruses and other security threats by restricting the execution of code from memory regions that are marked as non-executable. This helps to block the execution of malicious code, such as shellcode, which often relies on executing code in memory regions that should only contain data.
  2. ASLR (Address Space Layout Randomization): ASLR is a security technique that randomly arranges the address space positions of key data areas of a process, including the base of the executable and the positions of the stack, heap, and libraries. This randomization makes it more difficult for an attacker to predict target addresses and successfully exploit memory corruption vulnerabilities, as the exact addresses where shellcode could be executed become unpredictable.

“Defender” (presumably referring to Windows Defender) is an anti-malware component of Microsoft Windows, but it is not specifically a memory-based protection measure against shellcode. “PowerShell” is a task automation and configuration management framework, also not directly related to memory-based protection against shellcode.

For more Questions and Answers:

Threat Analysis Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments