Chapter 7: Practical Overflow Example

image from book  Download CD Content

Overview

By the end of November 2004, another vulnerability to buffer overflow was detected in Microsoft Internet Explorer. This time, it was the IFRAME tag. Just before Christmas, an exploit appeared, which wasn't quite useable but already published across the Internet. By that time, the number of vulnerable computers was counted in the millions. The hackers didn't even dare to dream about such a wonderful Christmas gift. True hackers spend their Christmas holidays not at the festive table but in the company of the monitor!

The New Year came, and security holes in programs remained. How do you reanimate an exploit? How do you rewrite the shellcode? How do you protect the computer against attacks? All of these topics will be covered in this chapter.



Shellcoder's Programming Uncovered
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net