Monthly Archives: October 2005

Create and test buffer overflow exploits

Notes on the creation of buffer overflow exploits To overflow a buffer, we create an exploit string that will go in the buffer. The exploit code can be either at the beginning or at the end of this string. We … Continue reading

Posted in Security