ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Exploit Development Research on x86 Windows Application: Buffer Overflow

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)

Publication Date:

Authors : ; ;

Page : 636-640

Keywords : Vulnerability Testing; Exploit Development; Bypass DEP; ASLR; SEH; Egg Hunting;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it

Last modified: 2021-06-30 21:34:49