A skilled hacker can locate buffer overflow conditions in programs and use them to compromise systems. Although the techniques discussed in this chapter focus on staged vulnerabilities in programs in a lab, they just as easily can be used to find vulnerabilities in commercial applications. Many hackers have done this in the past.
The message of this chapter warrants serious consideration. The message is that, even with all the security controls, procedures, patches, and fixes that you might use, you are still vulnerable without software such as Entercept (http://www.entercept.com) that can prevent such attacks.