Exploit Development Research on x86 Windows Application: Buffer Overflow
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Geogen George; Sivasundaram R;
Page : 636-640
Keywords : Vulnerability Testing; Exploit Development; Bypass DEP; ASLR; SEH; Egg Hunting;
Abstract
The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it
Other Latest Articles
- Gesture Authentication via Multi-touch Biometrics
- Organizational Justice and Organizational Commitment
- Anti-Psoriatic Activity of Musa Mysore Aab (Poovan Banana) Peel Extract Using Human Keratinocyte Cell Line
- Database Privilege Management and Data Dictionary: Security Issues and Avoidance
- Flexible Power Electronic Transformer
Last modified: 2021-06-30 21:34:49