0% found this document useful (0 votes)
31 views7 pages

Buffer Overflow Attack

A buffer overflow attack exploits a vulnerability in programs that do not properly check the size of input values. This allows an attacker to overwrite existing variable values or the return address of a function stored on the stack. The document outlines a buffer overflow attack on a program using a vulnerable "gets" function that does not check input size. It then provides screenshots demonstrating the output of the attack.

Uploaded by

Bharath Bunny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views7 pages

Buffer Overflow Attack

A buffer overflow attack exploits a vulnerability in programs that do not properly check the size of input values. This allows an attacker to overwrite existing variable values or the return address of a function stored on the stack. The document outlines a buffer overflow attack on a program using a vulnerable "gets" function that does not check input size. It then provides screenshots demonstrating the output of the attack.

Uploaded by

Bharath Bunny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
You are on page 1/ 7

Buffer overflow attack

Team members:

B.GuruAnupam.Reddy-18bce1172

N.Naveen.Reddy-18bce1036

K.Bharath Sai-18bce1264

Guide:

Prof R.K.singh
Stack layout
Information about stack


Every process has a virtual memory

There is a stack to maintain information in
virtual memory

The local variables are stored in the stack of
memory

Stack also contain information like return
address of a function.
Attack process


Gets is a vulnarable function.

It dosent check for size of input values.

If size is more it over writes the pre exsisting
variables values.

We are going to use this vulnariable function in
a program and attack the program.
Output screen shots
thankyou

You might also like