Do they really work directly with the bytes and registers?

In a recent discussion with a student about buffer overflows and related topics, it was called into question just how 'low' an attacker will get where manipulating a running application is concerned. One opinion stated that exploits are written in higher languages and compiled into assembly before transporting to the victim. While this is true in some cases, it is also true that some attacks take place one byte and a time, and one CPU register at a time.

Check out this example...

Ethical Hacking and Computer Forensics






<< Home

This page is powered by Blogger. Isn't yours?