Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Implementing Buffer Overflow Attacks

URL
http://ftp.ccc.de/congress/2001/mp3/vortraege/tag3/saal2/Implementing-buffer-overflow-attacks.mp3
File name
Implementing-buffer-overflow-attacks.mp3
File size
6.2 MB
MD5
02324e2fd416ae2cb950bcc8fa62d6de
SHA1
11e7ec046da11d0d12d5c166ca1111121bfe6244

Using examples under Linux (IA-32) I will demonstrate how buffer overflow attacks work and how to implement them. I will explain the technical background and present “recipes”. Additionally, I will demonstrate the most important tools to prevent buffer overflow attacks. You should know about C to follow my talk.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !