Buffer Overflows

  • Buffer Overflows occur when the buffer space gets filled up and spills over to the EBP (Extended Base Pointer) and EIP (Extended Instruction Pointer)/ Return Address

  • When this spill over occurs malicious code can be injected and executed

Steps to Conduct a Buffer Overflow

  1. Spiking - method used to find vulnerable areas of a program

  2. Fuzzing - sending characters at a program to try to break it

  3. Finding the Offset - finding at which point the program broke

  4. Overwriting the EIP - using the offset to overwriting the pointer address

  5. Finding Bad Characters

  6. Finding the Right Module

  7. Generating Shellcode

  8. Root

Last updated