From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Exploiting buffer overflows and creating payloads

Exploiting buffer overflows and creating payloads

From the course: Certified Ethical Hacker (CEH)

Exploiting buffer overflows and creating payloads

in a system. It can lead to a denial of service condition because a program can crash or the whole device can crash, right? This is something that has been very popular running of course HTTP, HTTPS or let's say a Cisco router running OSPF, BGP, and many other applications, right? Again, nothing is immune to this regardless of the vendor, regardless of the technology, you know, whether it's a Windows machine, a Linux box, Mac OS X and so on. I have a couple of examples of buffer overflows under my GitHub repository. So if you have a WebSploit, you already have a copy of my GitHub repository and that is under the h4cker directory, and if you go under the buffer_overflow_example, you basically see a few files in here. Now, I have a program that you have the source code, and it's also compiled here, and first, let me show you the source code of that program, and if you go to bad_code.c, and I'm just going to open that right now here, you don't have to be a programmer to actually know…

Contents