Jump to content
Nytro

C/C++ and Buffer Overflow Topics

Recommended Posts

Posted

C/C++ and Buffer Overflow Topics

Buffer overflow, one of the widely used exploit in the last decades that effect the internet domain in large for example through virii and worms. What is the real cause actually? In this tutorial we will investigate some of the fundamental reasons that can be found in C/C++ programs, applications and processors that can generate the buffer overflow problem. Though most of the C/C++ functions/libraries already implemented new constructs, the secure constructs, the effect still can be seen till today. You will see that programmers also must be competent and have the responsibility in building programs or applications that are secure.

  1. [h=1] Introduction - Intro to how and why buffer overflow happens and exploited.[/h]
  2. [h=1] Basic of x86 Architecture - The basic of Intel processor internal architecture that related to buffer overflow topics, registers and basic instruction sets operations.[/h]
  3. [h=1] Assembly Language - Introduction to the assembly language, needed to program buffer overflow codes during the Shellcode building, payload crafting and shrinking the size of the C programs.[/h]
  4. [h=1] Compiler, Assembler & Linker - The process of compiling, assembling and linking C/C++ codes, the step-by-step operations.[/h]
  5. [h=5] C Function Operation - The details of the C/C++ function operation, stack call setup and destruction.[/h]
  6. [h=1] C Stack Setup - The C/C++ stack story, exposes the exploited buffer in registers.[/h]
  7. [h=1] Stack Operation - The C/C++ stack operation that exposes the exploited buffer.[/h]
  8. [h=1] Stack-based Buffer Overflow - How the processor's buffer can be over flown by malicious codes.[/h]
  9. [h=1] Shellcode: The Payload - Understanding and creating the shellcodes for the buffer overflow payloads, creating the malicious codes.[/h]
  10. [h=1] Vulnerability & Exploit Examples - Testing the the real C codes in the real and controlled environment to show the buffer overflow in action. Escalating the local Linux Fedora Core root privilege.[/h]
  11. [h=1] C, C++ and Bufferoverflow Books[/h]

- See more at: The buffer overflow hands-on tutorial using C programming language on Linux/Unix platforms and Intel microprocessor architecture with C code samples and tons of illustrations

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...