Buffer overflows in the wild?

I’ve been working through learning buffer overflows for CTFs, etc. Usually it’ll be something like a binary on a Linux server that runs a chat program and you can overflow the ‘message’ field to inject shell code and catch a reverse shell to the server.

It seems very unlikely that this would be a scenario one would encounter in the wild. Does anyone have any experience using a buffer overflow in the wild (during a pentest…or…not 🤓)?

submitted by /u/audiobridgematt
[link] [comments]

from hacking: security in practice https://ift.tt/KzpY27Q

Comments