Lecture 5 Bufferoverflow
Lecture 5 Bufferoverflow
vulnerabilities
and penetration
testing
Dr Phillip James
Last week we explored the first phases of system
Recap and hacking:
today • Passwords
• Network access
• Root kits
Result:
Hello, World!
Assembly
Base
pointer Saved base pointer
Return address
Arguments
.
.
.
Notice we see:
Also:
YES.