Answer:
Attackers perform stack-based memory corruption attacks by manipulating data on the program stack, often to overwrite return addresses and influence program flow.
Attackers perform stack-based memory corruption attacks by manipulating data on the program stack, often to overwrite return addresses and influence program flow.
You may be interested in:
Web Security MCQs