buffer overflow
-
a series of new critical security vulnerabilities have been found in the jetson chip framework (nvidia) that could affect millions of active graphics cards worldwide.
-
this article covers buffer overflow that occurs on the stack and the technique of exploiting this common security error. this article consists of two parts: part 1: organizing memory, stack, function calls, shellcode and part 2: exploiting buffer overflow techniques
-
in the previous section we have reviewed the memory organization, stack, calling the function to understand thoroughly why when the buffer overflow occurs, we can change the value of the command pointer register% eip, from which can execute any code. we also learned how to create a simple shellcode
-
this article covers buffer overflow that occurs on the stack and the technique of exploiting this common security error. this article consists of two parts: part 1: organizing memory, stack, function calls, shellcode and part 2: exploiting buffer overflow techniques
-
in the previous section we have reviewed the memory organization, stack, calling the function to understand thoroughly why when the buffer overflow occurs, we can change the value of the command pointer register% eip, from which can execute any code. we also learned how to create a simple shellcode
-
basically, buffer overflow is caused by the user sending too much data to a program and part of this data is forced to store out of memory that the programmer has allocated.