Buffer overflow explained: The basics

Oct. 8, 2017 0 comments Hacking Tutorials Pen Testing & Audits

One of the most common and oldest security vulnerabilities in software are buffer overflow vulnerabilities. Buffer overflow vulnerabilities occur in all kinds of software from operating systems to client/server applications and desktop software. This often happens due to bad programming and the lack of or poor input validation on the application side. In this article we will look at what a buffer overflow exactly is, how they work and how they can become serious security vulnerabilities. We will also look at what happens when a buffer overrun occurs and mitigation techniques to minimize their harmful effects.

http://www.hackingtutorials.org/exploit-tutorials/buffer-overflow-explained-basics/