Description: Nowadays there are many buffer overflow exploit codes. The early buffer
overflow exploit codes only spawn a shell ( execute /bin/sh ). However,
nowadays some of the buffer overflow exploit codes have very nice features.
For example, passing through filtering, opening a socket, breaking chroot,
and so on. This paper will attempt to explain the advanced buffer overflow
exploit skill under intel x86 linux.
To Search:
- [BufferOverflow] - BufferOverflow principle examples of buf
- [bufBomb] - Classic buffer overflow attack code, con
- [Attacker] - under windows buffer overflow procedure
- [huan] - Buffer overflow attacks on the network p
- [OVERFlow_in2003] - overflow summary in 2003
- [LinuxKernelExpress] - linux kernel file a comprehensive interp
- [boon-1.0] - David Wagner to write the source code fo
File list (Check if you may need any files):
Buffer Overflows b
..................\Buffer Overflows b
..................\..................\Advanced buffer overflow exploits.txt
..................\..................\Exploiting Stack Based Buffer Overflows.txt
..................\..................\Part 1.txt
..................\..................\Part 2.txt
..................\..................\smashstack.txt
..................\..................\Understanding Buffer Overruns - Simple C Example.txt
..................\..................\VBE Document Property Buffer Overflow.txt
..................\..................\Win32 Stack Based Buffer Overflow Walkthrough.txt