How do i analyze buffer Overflow ?

Discussion on reverse-engineering and debugging.

How do i analyze buffer Overflow ?

Postby r00tMe » Sun Nov 20, 2016 10:43 pm

How do i analyze these exploit such mentioned as bufferOverflow in IDA pro ? i am new to finding vulnerability on windows app I think i will grasp soon.
Any help or Your concern is appreciated.

https://www.exploit-db.com/exploits/40458/
https://www.exploit-db.com/exploits/40711/
r00tMe
 
Posts: 8
Joined: Thu Sep 29, 2016 4:29 pm
Reputation point: 0

Re: How do i analyze buffer Overflow ?

Postby p4r4n0id » Thu Nov 24, 2016 1:13 pm

Keep Low. Move Fast. Kill First. Die Last. One Shot. One Kill. No Luck. Pure Skill.
http://p4r4n0id.com/
p4r4n0id
 
Posts: 126
Joined: Thu Sep 22, 2011 11:36 am
Location: Israel
Reputation point: 30

Re: How do i analyze buffer Overflow ?

Postby hyppocrite » Fri Apr 07, 2017 6:13 am

There is a long list of literature on the subject, both online and in paper.

One of my favourite introductions to memory corruption including buffer overflows is the 2nd edition of "Art of exploitation".
However, this book takes a linux perspective on exploitation, if you would a more thorough analysis on exploitation on the Windows platform I would suggest the 2nd edition of the shellcoders handbook.
hyppocrite
 
Posts: 2
Joined: Thu Feb 25, 2016 12:09 pm
Reputation point: 0


Return to Reverse Engineering and Debugging

Who is online

Users browsing this forum: No registered users and 1 guest