Talk With an Expert

Stack Based Overflows: Detect and Exploit

Stack Based Overflows: Detect and Exploit (PDF, 2.19MB)Published: 06 Nov, 2007
Created by
Morton Christiansen

Buffer overflows remain some of the most serious and widespread vulnerabilities that exist, often giving an attacker complete control over the compromised system. Thus, in depth knowledge of how these vulnerabilities and exploits work is of utmost importance to penetration testers and incident handlers. This report provides the reader with a basic understanding of how stack based overflows work in practice. This is illustrated, while at the same time uncovering new vulnerabilities in the latest version of Windows XP.