Back to Cptr427Winter2010

Hacking Exposed Chapter 10: Hacking Code

Common exploit techniques

Stack Buffer Overflows

Countermeasures

Heap/BSS/Data Overflows

Countermeasures

Format String Attacks

Countermeasures

Off-by-One Errors

Countermeasures

Canonicalization Attacks

Countermeasures

Common Countermeasures

Conclusion

Quiz

Answers

HackingExposedChapter10 (last edited 2010-04-20 02:38:51 by host-216-229-236-29)