How security flaws work: The buffer overflow

Post Reply
User avatar
Pigeon
Posts: 18055
Joined: Thu Mar 31, 2011 3:00 pm

How security flaws work: The buffer overflow

Post by Pigeon » Thu Aug 27, 2015 12:26 am

For those who may not be aware how this long used flaw is used. It also gives an incite into how computers use the various memory areas and structure.

To understand why buffer overflows happen—and why their impact is so grave—we need to understand a little about how programs use memory and a little more about how programmers write their code. (Note that we'll look primarily at the stack buffer overflow. It's not the only kind of overflow issue, but it's the classic, best-known kind.)

Link to complete article


User avatar
Royal
Posts: 10562
Joined: Mon Apr 11, 2011 5:55 pm

Re: How security flaws work: The buffer overflow

Post by Royal » Thu Aug 27, 2015 5:34 am

Didn't care at first glance when you posted, but after further reading this is an extremely under rated concept regarding computers and reality.

Another TD Gem. Thank you!

User avatar
Pigeon
Posts: 18055
Joined: Thu Mar 31, 2011 3:00 pm

Re: How security flaws work: The buffer overflow

Post by Pigeon » Thu Aug 27, 2015 10:23 am

How to make the BSOD work for you. History of how we got here.

Post Reply