Smashing the Stack for Fun and Profit
Read the classic paper by Aleph One on stack smashing.
Submit a response to the following questions:
What are two different ways to succeed at a stack smashing attack described in the paper?
How does the paper recommend you find a buffer overflow vulnerability? Do you know of any other ways to find this vulnerability?
What two questions do you have about stack smashing attacks that you can bring to class?
Back to top