Stack canaries or security cookies are tell-tale values added to binaries during compilation to protect critical stack values like return pointers against buffer overflow attacks. If an incorrect canary is detected during certain stages of the execution flow, such as right before return, the program will be terminated. Their presence makes exploitation of such vulnerabilities more difficult. But not impossible.
In this webcast, we will be discussing:
Our trip will take us along 32 and 64 bit binaries, assembly (though no fluency is expected), /GS, my grandfather's professional history.