We have dealt with various security concerns, attack methods and countermeasures in the preceding modules. Buffer Overflow attacks had been a constant source of worry from time to time. This module looks at different aspects of buffer overflow exploits. After completing this module, you will be familiar with the following topics:
What is a Buffer Overflow?
Exploitation
How to detect Buffer Overflows in a program?
Skills required
CPU / OS Dependency
Understanding Stacks
Stack Based Buffer Overflows
Technical details
Writing your own exploits
Defense against Buffer Overflows
On Oct 19 2000, hundreds of flights were grounded or delayed because of a software problem in the Los Angeles air traffic control system. The cause was attributed to Mexican Controller typing 9 (instead of 5) characters of flight-description data, resulting in a buffer overflow.