Buffer Overflow - Exploitation

Exploitation

The techniques to exploit a buffer overflow vulnerability vary per architecture, operating system and memory region. For example, exploitation on the heap (used for dynamically allocated memory), is very different from exploitation on the call stack.

Read more about this topic:  Buffer Overflow

Famous quotes containing the word exploitation:

    The only phenomenon with which writing has always been concomitant is the creation of cities and empires, that is the integration of large numbers of individuals into a political system, and their grading into castes or classes.... It seems to have favored the exploitation of human beings rather than their enlightenment.
    Claude Lévi-Strauss (b. 1908)

    The elements of success in this business do not differ from the elements of success in any other. Competition is keen and bitter. Advertising is as large an element as in any other business, and since the usual avenues of successful exploitation are closed to the profession, the adage that the best advertisement is a pleased customer is doubly true for this business.
    Madeleine [Blair], U.S. prostitute and “madam.” Madeleine, ch. 5 (1919)

    Communism is inequality, but not as property is. Property is exploitation of the weak by the strong. Communism is exploitation of the strong by the weak.
    Pierre-Joseph Proudhon (1809–1865)