Smashing the Stack for Fun and Profit
Read the classic paper by Aleph One on stack smashing.
Submit a response to the following questions:
What are two different ways to succeed at a stack smashing attack described in the paper?
How does the paper recommend you find a buffer overflow vulnerability? Do you know of any other ways to find this vulnerability?
Back to top