The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people’s tools, while hackers and security pros write their own tools. To that end, we’re going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands.

Understanding the Structure of a Program

Before we can understand how to exploit a program, we should have a general understanding of the program itself. When you first run a program, all of the information… more

Go to Source


Comments are closed.