Buffer overflow attacks the beginners manual-vulnerability warning-the black bar safety net

ID MYHACK58:62201452165
Type myhack58
Reporter 佚名
Modified 2014-08-06T00:00:00



A buffer overflow occurs in the user input related to the buffer zone, in the General case, this has turned into a modern computer and network aspects of the biggest security risks. This is because in the program on the basis it is prone to this problem, but it is for the unaware or unable to get the source code of the user it is impossible, many of the similar problems will be utilized. In this paper, the purpose is to teach newbies, especially C programmers, explaining how to use this overflow to the environment. - Mixter

1 Memory

Note: I'm here description of the method: most of the computer memory as a process of the organizers, but it depends on the processor architecture type. This is an x86 example, but can also be applied in the sparc.

Buffer overflow attacks principle is the cover can not be rewritten random input and in the process of implementation of code memory. To understand where and how the occurrence of overflow, let us look at how memory is organized. The page is using and its associated address of the memory of one part, which means that the kernel process memory initialization, which it is not necessary to know the RAM allocation of the physical address. Process memory consists of the following three components:

The code snippets in this piece of code in the data through the Processor executing the compiled instructions. The code execution is non-linear, it can skip code, jump, in some specific situations function. In this, we use the EIP pointer, or the pointer Directive. Where the EIP points to the address always contains the next code execution.

[1] [2] [3] [4] [5] [6] [7] [8] [9] [1 0] [1 1] [1 2] [[1 3]] (<52165_13.htm>) next