Control Hijacking
Control Hijacking
The mechanism in which the attacker starts overwriting a few lines of the
program, in such a way that the output of the program becomes incorrect.
And later on, the output changes with respect to the program and is
called control hijacking.
Control Hijacking
The solution to the above problem is to divide the program into small parts.
And check the output of the program at every step, due to which all the
output will never be incorrect at the same time. Hence, lines of the program
overwritten by the attacker can easily be traced after which the error can also
be removed.
Types of Control Hijacking Attacks
Buffer Overflow Attack
Integer Overflow Attack
Format String Vulnerabilities
The solution to the problem is that always specify the memory space before
the execution of the program, as a result, the execution of the program will
stop when the specified memory space is full and therefore the condition of
overflow is avoided.
Hence, the memory can be protected from hacker attacks.
Types of Buffer overflow attack:
1. Stack Based Buffer Overflow
2. Heap Based Buffer Overflow
2. Runtime Defence
Step 1: Protect the memory from unwanted access.
Step 2: Use standard antivirus and firewall.
Step 3: Allow execution in a given space.
Step 4: Use allocated space in memory.
Step 5: Minimum execution time of the program.
Step 6: Prevent buffer space.
Step 7: End the program for complete execution.
The runtime defense mechanism deals with the flow of the program from one
end to another where the execution is done in the allocated space along with
the minimum time of execution in the given hardware and software part after
which the program is ended, in order to complete the execution process.