lsud00d wrote: » A type of buffer overflow is a NOP slide. It's essentially a series of instructions ('no operations' in assembly, aka 0X90) that "slides" the CPU execution to a specific address space in memory where the exploit code exists. Here's a visual (which won't display here for some reason)--http://2.bp.blogspot.com/-VuK5LaCFS9k/UBFDm439krI/AAAAAAAAAF0/-8Yz8ILFXfI/s400/NOPsled.png NOP slides are a way to brute force ASLR.
ratbuddy wrote: » A classic paper on the subject can be found here: Smashing the Stack for Fun and Profit by Aleph One It's not 100% applicable and somewhat out of date, but provides a great foundation on buffer overflows. edit: Poked around a little, here's a bit of more recent work: .:: Phrack Magazine ::.
ratbuddy wrote: » It hasn't really crashed, just been corrupted or sort of run off the rails. The question isn't really worded great. It is beneficial for programs to crash as soon as a buffer overflow happens, that would in theory prevent the exploit code from running.
lsud00d wrote: » A type of buffer overflow is a NOP slide.
paul78 wrote: » ... d) The key aspect is that you are over-flowing a buffer on an input field which causes the application stack to redirect execution to code embeded in the attack payload.
The key aspect is that you are over-flowing a buffer on an input field which causes the application's memory stack to redirect execution to code embeded in the attack payload.