Preview

Buffer Overflow Research Paper

Good Essays
Open Document
Open Document
481 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Buffer Overflow Research Paper
Buffer Overflow
Subscribe
Hide Description
Explain what buffer overflow attacks are and how they are created to attack our software. And, describe the best security measures you would recommend mitigate these buffer overflow attacks.
Buffer overflow attacks occurs when hackers sending a large amount of data than the buffer was intended to hold, this large amount data immediately overwrite and corrupt other data in the buffer. Data contain codes to trigger specific actions that controls the program execution path and hijack the control of the program to execute the hacker 's code instead of the system process code. It could change and modify user data, disclose sensitive information, brings down applications and lock up the system or applications.
Hackers can use a buffer overflow to cause havoc to a web application, hack into the web server, gain control of a corporate machine, launch programs/commands from the stack. A buffer overflow can be used
…show more content…

Code auditing in automated and manual.
Use higher level programming languages that disallow direct memory access.
Use compilers that protect against stack overflows. Developer can write programs in Java instead of C to prevent buffer overflow.
Use StackGuard or other compiler tools like StackShield or Libsafe to hardens programs against stack overflow attacks, detects and defeats stack smashing attack.
Any field of entry or input could be a potential point of vulnerability for buffer overflow. Input must be validate to prevent unexpected data for being process.
References:
EC-Council, (2000). Ethical Hacking and Countermeasures Threats and Defense Mechanisms. Clifton Park, N.Y. Cengage


You May Also Find These Documents Helpful

  • Satisfactory Essays

    The first category of faults flips random bits in random instructions of the program text to emulate hardware faults. These faults are easy to inject, and they cause a variety of different crashes. It is difficult to relate a bit flip with a specific error in programming, and most hardware bit flips would be caught by parity on the data or address bus.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Could Allow Remote Code Execution, two heap overflow, cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a respectable programmer. It is expensive to use because the run time will unwind the stack until it finds…

    • 442 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Hacking of random access memory (RAM) is a very basic idea. Hacking itself is defined as using a computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers.…

    • 838 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    To begin one of the most basic types of possible threats can come from what is called an IP sweep. What an IP sweep basically is a broad area ping that allows the user to determine what hosts if any exist on a network given a certain IP address range. A normal ping consists of a single hello message from one computer to the receiving computer. A ping sweep pings any and all computer to determine which are alive so that the attacker can figure out where he can attack the network.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays