Compare cert salaries and plan your next career move
lsud00d wrote: » A type of buffer overflow is a NOP slide. It's essentially a series of instructions ('no operations' in assembly, aka 0X90) that "slides" the CPU execution to a specific address space in memory where the exploit code exists. Here's a visual (which won't display here for some reason)--http://2.bp.blogspot.com/-VuK5LaCFS9k/UBFDm439krI/AAAAAAAAAF0/-8Yz8ILFXfI/s400/NOPsled.png NOP slides are a way to brute force ASLR.
ratbuddy wrote: » A classic paper on the subject can be found here: Smashing the Stack for Fun and Profit by Aleph One It's not 100% applicable and somewhat out of date, but provides a great foundation on buffer overflows. edit: Poked around a little, here's a bit of more recent work: .:: Phrack Magazine ::.
ratbuddy wrote: » It hasn't really crashed, just been corrupted or sort of run off the rails. The question isn't really worded great. It is beneficial for programs to crash as soon as a buffer overflow happens, that would in theory prevent the exploit code from running.
lsud00d wrote: » A type of buffer overflow is a NOP slide.
paul78 wrote: » ... d) The key aspect is that you are over-flowing a buffer on an input field which causes the application stack to redirect execution to code embeded in the attack payload.
The key aspect is that you are over-flowing a buffer on an input field which causes the application's memory stack to redirect execution to code embeded in the attack payload.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.