Back to Cptr427Winter2010

Hacking Exposed Chapter 10: Hacking Code

Common exploit techniques

Stack Buffer Overflows

Countermeasures

Heap/BSS/Data Overflows

Countermeasures

Format String Attacks

Countermeasures

Off-by-One Errors

Countermeasures

Canonicalization Attacks

Countermeasures

Common Countermeasures

Conclusion

Quiz

Answers