Explain how an attacker can still exploit a buffer overow


Ben wants to prevent attackers from exploiting bugs in his server, so he decides to make the stack memory non-executable. Explain how an attacker can still exploit a buffer over?ow in his code to delete ?les on the server. Draw a stack diagram to show what locations on the stack you need to control, what values you propose to write there, and where in the input string these values need to be located.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Explain how an attacker can still exploit a buffer overow
Reference No:- TGS02519663

Now Priced at $10 (50% Discount)

Recommended (91%)

Rated (4.3/5)