I’ve been working through learning buffer overflows for CTFs, etc. Usually it’ll be something like a binary on a Linux server that runs a chat program and you can overflow the ‘message’ field to inject shell code and catch a reverse shell to the server.
It seems very unlikely that this would be a scenario one would encounter in the wild. Does anyone have any experience using a buffer overflow in the wild (during a pentest…or…not 🤓)?
[link] [comments]
from hacking: security in practice https://ift.tt/KzpY27Q
Comments
Post a Comment