Jump to content
Posted 24 September 2013 - 11:25 AM
Posted 09 October 2015 - 07:43 AM
Has anyone studied the mechanism of how exploits produced and inserted, a fascinating subject?
Surprisingly enough delivery can be achieved with that old chestnut, the buffer overflow. Up to 3000 exploits using this delivery mechanism are detected every year on the web.
Since many of these processes run as root, or SYSTEM, successfully exploiting them allows a malicious user a privilege escalation that amount to total control over the target machine.
Windows infamously revamped its security focus after two buffer overflow-driven exploits in the early 2000's. And a buffer overflow found in a Linux driver left (potentially) millions of home and small office routers vulnerable to attack.
Whilst these exploits are largely unsuccessful on current Windows and linux systems due to up to date patching,they can still attack companies legacy programs written in C or C++.
Never let your guard down, vigilance is needed at all times!!
Posted 29 August 2018 - 06:58 AM
I can exploit them as well as items from another thread. very useful.
0 members, 0 guests, 0 anonymous users