Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Buffer overflow
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==External links== * [https://raykoid666.wordpress.com/2009/11/28/remote-buffer-overflow-from-vulnerability-to-exploit-part-1/ "Discovering and exploiting a remote buffer overflow vulnerability in an FTP server"] by Raykoid666 * [https://www.phrack.org/issues/49/14.html#article "Smashing the Stack for Fun and Profit"] by Aleph One * {{cite journal | url=https://iac.dtic.mil/iatac/download/Vol7_No4.pdf | date=2005-05-02 | archive-url=https://web.archive.org/web/20060927225105/https://iac.dtic.mil/iatac/download/Vol7_No4.pdf | archive-date=2006-09-27 | url-status=dead | title=An Overview and Example of the Buffer-Overflow Exploit | pages=16β21 | volume=7 | issue=4 | journal=IAnewsletter | publisher=[[Information Assurance Technology Analysis Center]] | access-date=2019-03-17 | first=Isaac | last=Gerg }} * [https://www.securecoding.cert.org/ CERT Secure Coding Standards] * [https://www.cert.org/secure-coding CERT Secure Coding Initiative] * [https://www.cert.org/books/secure-coding Secure Coding in C and C++] * [https://www.sans.org/reading_room/whitepapers/securecode/386.php SANS: inside the buffer overflow attack] * [https://web.archive.org/web/20130126024851/https://www.awarenetwork.org/etc/alpha/?x=5 "Advances in adjacent memory overflows"] by Nomenumbra * [https://www.blackhat.com/presentations/bh-usa-04/bh-us-04-silberman/bh-us-04-silberman-paper.pdf A Comparison of Buffer Overflow Prevention Implementations and Weaknesses] * [https://web.archive.org/web/20090817230359/https://doc.bughunter.net/buffer-overflow/ More Security Whitepapers about Buffer Overflows] * [https://web.archive.org/web/20071129123212/https://www.syngress.com/book_catalog/327_SSPC/sample.pdf Chapter 12: Writing Exploits III] from ''Sockets, Shellcode, Porting & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals'' by James C. Foster ({{ISBN|1-59749-005-9}}). Detailed explanation of how to use Metasploit to develop a buffer overflow exploit from scratch. * [https://web.archive.org/web/20110721060319/https://csrc.nist.gov/publications/history/ande72.pdf Computer Security Technology Planning Study], James P. Anderson, ESD-TR-73-51, ESD/AFSC, Hanscom AFB, Bedford, MA 01731 (October 1972) [NTIS AD-758 206] * [https://web.archive.org/web/20170905183149/https://www.exploit-db.com/docs/18346.pdf "Buffer Overflows: Anatomy of an Exploit"] by Nevermore * [https://www.cansecwest.com/csw08/csw08-holtmann.pdf Secure Programming with GCC and GLibc] {{Webarchive|url=https://web.archive.org/web/20081121103054/https://cansecwest.com/csw08/csw08-holtmann.pdf |date=2008-11-21 }} (2008), by Marcel Holtmann * [https://www.helviojunior.com.br/it/security/criacao-de-exploits/criacao-de-exploits-parte-0-um-pouco-de-teoria/ "CriaΓ§Γ£o de Exploits com Buffer Overflor β Parte 0 β Um pouco de teoria "] (2018), by Helvio Junior (M4v3r1ck) {{Memory management navbox}} {{Authority control}} {{DEFAULTSORT:Buffer Overflow}} [[Category:Software bugs]] [[Category:Computer memory]] [[Category:Computer security exploits]] [[Category:Articles with example C code]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)