Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Buffer Overflow

1,086 views

Published on

This is the basic presentation on buffer overflow. I had Presented it Null Mumbai chapter on August 08 2015, This talks about stack based overflow in FTP Application

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Buffer Overflow

  1. 1. Smash The Stack Stack overflow Basics
  2. 2. Stack Over Flow In Picture
  3. 3. What we can Get?
  4. 4. What is Buffer overflow • In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. This is a special case of the violation of memory safety.
  5. 5. EIP The EIP register always contains the address of the next instruction to be executed. You cannot directly access or change the instruction pointer. However, instructions that control program flow, such as calls, jumps, loops, and interrupts, automatically change the instruction pointer.
  6. 6. Register • Register pointing to the top of the stack at any time ESP • Base Pointer: EBP – Stays consistent throughout a function so that it can be used as a placeholder to keep track of local variables and parameters. • EAX – “accumulator” normally used for arithmetic operations • EBX – Base Register • ECX – “counter” normally used to hold a loop index • EDX – Data Register • ESI/EDI – Used by memory transfer instructions • ESP – Points to last item on the stack
  7. 7. DEMO
  8. 8. Q&A
  9. 9. Thank You • @Securityb3ast • http://breakthesec.com • https://www.youtube.com/user/hackerkaus tubh
  10. 10. Thank You • @Securityb3ast • http://breakthesec.com • https://www.youtube.com/user/hackerkaus tubh

×