This is a series of three videos, which gives a quick start up on different exploitation and mitigation techniques for the buffer overflow vulnerability. The session start with an overview of a classic stack based buffer overflow. How a stack based buffer overflow can be exploited? Exploit mitigation techniques. The architecture of x86_64, its assembly and function calling convention. Installing and using PEDA. Finally a practical sample program is shown as to how to change the control of flow of execution of a program using PEDA.

Email: Example Codes:

One thought on “Lec38 Exploiting Buffer Overflow Vulnerability Part-I (Arif Butt @ PUCIT)

Leave a Reply

Your email address will not be published. Required fields are marked *