journal6 ›› 2007, Vol. 28 ›› Issue (4): 65-69.

• Physics and electronics • Previous Articles     Next Articles

The  Realization of the Network Attack based on Buffer Overflow

  

  1. (College of Physical Science and Information Engineering,Jishou University,Jishou 416000,Hunan China)
  • Online:2007-07-25 Published:2012-06-15

Abstract: As the contrary of information recovery technology,the network attack technology is playing a most important role in the field of information security .Buffer overflow is one of the most basic technology in network attack.Some of network attack technologies are introduced.The basic principle of buffer overflow is analysed.The realization of the network attack based on buffer overflow in windows is researched.The prevention and cure measure of the attack base on verflow vulnerability is summed up.

Key words: buffer overflow, network attack, shellcode, structred exception handling

WeChat e-book chaoxing Mobile QQ