Posted 24 September 2013 - 11:25 AM
Posted 09 October 2015 - 07:43 AM
Has anyone studied the mechanism of how exploits produced and inserted, a fascinating subject?
Surprisingly enough delivery can be achieved with that old chestnut, the buffer overflow. Up to 3000 exploits using this delivery mechanism are detected every year on the web.
Since many of these processes run as root, or SYSTEM, successfully exploiting them allows a malicious user a privilege escalation that amount to total control over the target machine.
Windows infamously revamped its security focus after two buffer overflow-driven exploits in the early 2000's. And a buffer overflow found in a Linux driver left (potentially) millions of home and small office routers vulnerable to attack.
Whilst these exploits are largely unsuccessful on current Windows and linux systems due to up to date patching,they can still attack companies legacy programs written in C or C++.
Never let your guard down, vigilance is needed at all times!!
Posted 14 May 2020 - 09:58 PM
I'm so much excited to read this discussion here. I hope these important links will help me a lot. Thank you so much!
Posted 26 September 2021 - 04:19 AM
Great information as usual. Thank you so much for sharing this thread here.
Posted 01 October 2021 - 01:00 PM
"I never made a mistake in my life. I thought I did once, but I was wrong."
0 members, 1 guests, 0 anonymous users