Guide to Stack Buffer Overflow (OSCP)

Stack buffer overflow is a memory corruption vulnerability that occurs when a program writes more data to a buffer located on the stack than what is actually allocated for that buffer, therefore overflowing to a memory address that is outside of the intended data structure.

This will often cause the program to crash, and if certain conditions are met, it could allow an attacker to gain remote control of the machine with privileges as high as the user running the program, by redirecting the flow execution of the application to malicious code.

https://steflan-security.com/complete-guide-to-stack-buffer-overflow-oscp/

Feel free to check out the rest of my blog if you're interested in ethical hacking :)

submitted by /u/cantchooseone96
[link] [comments]

from hacking: security in practice https://ift.tt/3ctUMcq

Comments