journal6 ›› 2007, Vol. 28 ›› Issue (4): 65-69.
• Physics and electronics • Previous Articles Next Articles
Online:
Published:
Abstract: As the contrary of information recovery technology,the network attack technology is playing a most important role in the field of information security .Buffer overflow is one of the most basic technology in network attack.Some of network attack technologies are introduced.The basic principle of buffer overflow is analysed.The realization of the network attack based on buffer overflow in windows is researched.The prevention and cure measure of the attack base on verflow vulnerability is summed up.
Key words: buffer overflow, network attack, shellcode, structred exception handling
HOU Chun-Ming, ZHENG Hua-Jun, ZHAO Ying-Nan. The Realization of the Network Attack based on Buffer Overflow[J]. journal6, 2007, 28(4): 65-69.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: https://zkxb.jsu.edu.cn/EN/
https://zkxb.jsu.edu.cn/EN/Y2007/V28/I4/65