Up

Buffer Overflows: Anatomy of an Exploit

Buffer Overflows: Anatomy of an Exploit
4 · 5 · 6 · 7 — 12 — 15

4 Flat memory model: contiguous area of memory. Call stack is one of many memory structures on x86 and other. 5 SP always points to the top. 6 IP is a instruction pointer (points to the address of the current instruction). 7 Two ways of taking control: (1) rewriting IP and (2) rewriting SEH.

12 Using buffer overflow you can rewrite boolean isLoggedIn and get access to the protected code part, not only create exploit. 15 NOP sled increase the catchment range of the shell-code.

Sergey Vartanov, 2007–2020