Buffer Overflow - Exploitation

Exploitation

The techniques to exploit a buffer overflow vulnerability vary per architecture, operating system and memory region. For example, exploitation on the heap (used for dynamically allocated memory), is very different from exploitation on the call stack.

Read more about this topic:  Buffer Overflow

Famous quotes containing the word exploitation:

    The elements of success in this business do not differ from the elements of success in any other. Competition is keen and bitter. Advertising is as large an element as in any other business, and since the usual avenues of successful exploitation are closed to the profession, the adage that the best advertisement is a pleased customer is doubly true for this business.
    Madeleine [Blair], U.S. prostitute and “madam.” Madeleine, ch. 5 (1919)

    The mother’s battle for her child—with sickness, with poverty, with war, with all the forces of exploitation and callousness that cheapen human life—needs to become a common human battle, waged in love and in the passion for survival.
    Adrienne Rich (20th century)

    Communism is inequality, but not as property is. Property is exploitation of the weak by the strong. Communism is exploitation of the strong by the weak.
    Pierre-Joseph Proudhon (1809–1865)