Jump to content
Nytro

Buffer Overflow Attacks - Ebook

Recommended Posts

Buffer

Overflow

Attacks

The buffer overflow is the whipping boy of software security. The main

reason for omnipresent discussion and hype surrounding the buffer

overflow is that the buffer overflow remains the principal method used to

exploit software by remotely injecting malicious code into a target. Al-

though the techniques of buffer overflow have been widely published else-

where, this chapter remains a necessity. The buffer overflow has evolved

over the years, as have a number of other attack techniques and, as a result,

powerful new buffer overflow attacks have been developed. If nothing else,

this chapter will serve as a foundation as you come to grips with the subtle

nature of buffer overflows

Download:

http://library.back2hack.cc/books/Hacking/Syngress_-_Buffer_Overflow_Attacks_-_Detect_Exploit_and_Prevent_%5B%5D_%282000%29_en.pdf

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...