How to find Buffer Overflow Vulnerabilities ? - Knowledge Is Free

Latest

Computer Tips, Tricks & Hacks.

BANNER 728X90

Monday, 4 November 2013

How to find Buffer Overflow Vulnerabilities ?


Buffer overflow is defined as the condition in which a program attempts to write data beyond the boundaries of pre-allocated fixed length buffers. This vulnerability can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. This vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the control flow of the program, because an overflow can change the return address.

In this lab, students will be given a program with a buffer-overflow vulnerability; their task is to develop a scheme to exploit the vulnerability and finally to gain the root privilege. In addition to the attacks, we will walk through several protection schemes that have been implemented in Fedora to counter against the buffer-overflow attacks. We will evaluate whether these schemes work or not.

It should be noted that the outcome of this lab is operating system dependent. Our description and discussion are based on Fedora Linux (Core 4 or 5); it should also work for the most recent version of Fedora. However, if you use different operating systems, different problems and issues might come up.


No comments:

Post a Comment