ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Buffer Overflow

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 6)

Publication Date:

Authors : ; ; ; ; ;

Page : 20-37

Keywords : Brain pan ios; Kali Linux; Buffer over flow; python code; shell code; metasploit exploit; OWASP Dir buster;

Source : Downloadexternal Find it from : Google Scholarexternal


Buffer overflow is the most common type or form of cyber security vulnerability in the last ten years. Buffer over flow is the vulnerability of remote network penetration area vulnerabilities, where a hacker, Attacker or anonymous user can have the gain or control of a host. Buffer over flow vulnerability can be effectively be eliminated, the big part of the serious security threats would be removed. In this paper, we learn, what is buffer over flow vulnerability, what are the methodology, what are the steps to exploit the buffer over flow vulnerability.

Last modified: 2021-06-22 18:18:17