缓冲区溢出攻击详细破解方法(英文)
1.Memory2.Functions3.Exampleofanexploitableprogram3a.Overflowingtheprogram3b.Changingthereturnaddress4.Shellcode4a.Makingthecodeportable4b.Theshellcode5.Writinganexploit5a.Samplezgvexploit5b.Furthertipsonwritingexploits6.Conclusions(1.Memory2.Functions3.Exampleofanexploitableprogram3a.Overflowingtheprogram3b.Changingthereturnaddress4.Shellcode4a.Makingthecodeportable4b.Theshellcode5.Writinganexploit5a.Samplezgvexploit5b.Furthertipsonwritingexploits6.Conclusions)
页:
[1]