Exploit Development: How to Manipulate Code Execution with the Instruction Pointer
The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands. Understanding the Structure of a Program Before we can understand how to exploit a program, we should have a general understanding of the program itself. When you first run a program, all of the information... more
from WonderHowTo http://ift.tt/2BFdFIr
via IFTTT