Presentation is loading. Please wait.

Presentation is loading. Please wait.

FIGURE Illustration of Stack Buffer Overflow

Similar presentations


Presentation on theme: "FIGURE Illustration of Stack Buffer Overflow"— Presentation transcript:

1 FIGURE 14.1 Security is a Consequence of People, Process, and Technology.

2 FIGURE 14. 2 Illustration of Stack Buffer Overflow
FIGURE 14.2 Illustration of Stack Buffer Overflow. (A) A normal stack frame. (B) A stack frame with an input variable within the bounds of the allocated stack buffer. (C) A stack frame with an input variable that is longer than the allocated stack buffer. In this case, the malicious input begins with assembly encoded executable exploit code, some padded bytes, and ends with the address of the beginning of the exploit code. This final address overruns the return address of the previous stack frame and, hence, will turn control of the flow of execution over to the exploit code.

3

4

5

6

7

8

9

10

11

12


Download ppt "FIGURE Illustration of Stack Buffer Overflow"

Similar presentations


Ads by Google