Jump to content
Nytro

Buffer Overflows: Anatomy of an Exploit

Recommended Posts

Posted

Buffer Overflows: Anatomy of an Exploit

A Look at How Systems are Exploited, and Why These Exploits Exist

Joshua Hulse

n3v3rm0r3.nevermore at gmail.com

January 10, 2012

This paper will look at how buffer overflows occur on the stack. It will outline

how the stack should be visualised when software engineers code in languages that

requires manual memory management(assembly, c, c++, etc) and the importance of

the ‘null terminating character’ in possible vulnerabilities.

Before considering the exploitation of systems and the methods that should be

employed to remove them, some time will be spent explaining the stack in the x86

architecture, the flat memory model employed by modern operating systems how

payloads are written and delivered to exploited programs.

Download:

http://www.exploit-db.com/download_pdf/18346

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...