Buffer Overflow Study Attacks and Defenses

Posted in Internet Security Whitepapers, Buffer Overflows, Exploit Writing Techniques

0.0/5 rating (0 votes)

Most of the exploits based on buffer overflows aim at forcing the execution of malicious code, mainly in order to provide a root shell to the user. The principle is quite simple: malicious instructions are stored in a buffer, which is overflowed to allow an unexpected use of the process, by altering various memory sections. Thus, we will introduce in this document the way a process is mapped in the machine memory, as well as the buffer notion; then we will focus on two kinds of exploits based on buffer overflow : stack overflows and heap overflows.
∙:∙ If you have trouble viewing this document, please click the link below!
Buffer Overflow Study Attacks and Defenses

Comments (0)

Leave a comment

Please login to leave a comment. Optional login below.