Cyber Security Expo
 
Remote Automatic Exploitation of Stack Overflows by Burebista on 31/07/03

The purpose of this paper is to prove that it is possible to remotely exploit hostile enviroments without having any idea of what the server-side software sources are.

This document is available in .PDF and .PS formats

NOTE: The paper was originally submited in .PS format.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.