The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Static Analysis Method for Detecting Buffer Overflow Vulnerabilities
Programming and Computing Software
Buffer Overflow Attacks
Hi-index | 0.00 |
Buffer overflow has been used for many years as an effective mean for system penetration to gain remote access [2, 3, 5, 6, 7]. Buffer overflow exploitation takes advantage of weak software programming such as boundary check for memory usage of declared buffers somewhere in the program to undermine software security and exploit its vulnerability so that attacker can remotely access victim's system. This access can be then escalated either vertical, to gain administrator privilege (in case of windows operating system, or root access, in case UNIX like operating system), or horizontal to access other host in the same network. This paper will try to address the question of, what buffer overflow is. How it happens? How it can be exploited? And what are the defense measures that can be taken to avoid such a problem? As a response to the above questions, a discussion about available commercial and open source software that are used as tools for exploitation are covered. The widely used open source software called Metasploit Framework is used to demonstrate the concept.