SlideShare a Scribd company logo
Buffer Overflow for
Beginners
Ajin Abraham
www.keralacyberforce.in
Buffer: it is a block of memory
What is Buffer Overflow?
Buffer overflow is caused when too
much data is inserted into a buffer
than it can handle. So this may lead to
the executing of arbitrary code if a
certain memory pointer is
overwritten.
Buffer Overflow for
Beginner
Command
Name
152903854
128 + 6 bytes
152903720
10 + 6 bytes
152903704
Buffer Overflow for
Beginner
Command {with system() function execute
the contents of the variable command}
system(command);
Name {Read to Name Variable and Print the contents
of name variable}
gets(name);
printf(“Hello %sn”,name);
Buffer Overflow for
Beginner
When you give an input,
say
www.keralacyberforce.in
What happens?
Buffer Overflow for
Beginner
commandorce.in
(10)namewww.kerala
(6)malloccyberf
152903832
128 + 6 bytes
10 + 6 bytes
152903704
It will be assigned to the memory like this.
Buffer Overflow for
Beginner
This buffer overflow is
caused because the
gets() function doesn't
limit’s the length of the
input
Buffer Overflow for
Beginner
To overrule this buffer
overflow you can use
fgets(name, 10, stdin);
where it will read a maximum
of 10 characters from the
input.

More Related Content

PPTX
Buffer overflow for Beginners
PPTX
Primeiros Passos na API do Zabbix com Python - 2º ZABBIX MEETUP DO INTERIOR-SP
PDF
Scaling WordPress
PPT
4 exercises for part 1
ODP
WebSockets with PHP: Mission impossible
PPT
Azure ServiceBus Queues and Topics
PDF
Eventful Email in Ruby
PDF
Steve Corona: Scaling LAMP doesn't have to suck
Buffer overflow for Beginners
Primeiros Passos na API do Zabbix com Python - 2º ZABBIX MEETUP DO INTERIOR-SP
Scaling WordPress
4 exercises for part 1
WebSockets with PHP: Mission impossible
Azure ServiceBus Queues and Topics
Eventful Email in Ruby
Steve Corona: Scaling LAMP doesn't have to suck

What's hot (20)

PDF
Installing Tomcat on Ubuntu Instance
PPTX
PPTX
Oracle Database Cloud Performance Doag 2016
PDF
LCA2014 - Introduction to Go
PPTX
Scheduling torque-maui-tutorial
PDF
maXbox Starter 42 Multiprocessing Programming
PDF
Dev ops on startup environment
PDF
톰캣 #09-쓰레드
PPTX
Cse 241
PDF
Ip firewall mangle
PDF
How to install a wordpress theme in local computer
PDF
WordPress Security - A Top Down Approach
ODP
sshuttle VPN (2011-04)
ODP
Caching web contents in the browser
PDF
Aeon mike guide transparent ssl filtering
PDF
Aeon mike guide transparent ssl filtering (1)
PDF
PostgreSQL Configuration for Humans / Alvaro Hernandez (OnGres)
DOCX
Automation m ysql_and_customer_photo
PPTX
你不知道的前端
PPTX
Cloudera amazon-ec2
Installing Tomcat on Ubuntu Instance
Oracle Database Cloud Performance Doag 2016
LCA2014 - Introduction to Go
Scheduling torque-maui-tutorial
maXbox Starter 42 Multiprocessing Programming
Dev ops on startup environment
톰캣 #09-쓰레드
Cse 241
Ip firewall mangle
How to install a wordpress theme in local computer
WordPress Security - A Top Down Approach
sshuttle VPN (2011-04)
Caching web contents in the browser
Aeon mike guide transparent ssl filtering
Aeon mike guide transparent ssl filtering (1)
PostgreSQL Configuration for Humans / Alvaro Hernandez (OnGres)
Automation m ysql_and_customer_photo
你不知道的前端
Cloudera amazon-ec2
Ad

Similar to Exploit Research and Development Megaprimer: Buffer overflow for beginners (20)

PDF
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
PPTX
Buffer overflow explained
PPTX
Buffer overflow
PDF
bufferoverflow-151214121251 presentation
PDF
Buffer OverFlow Exploit
ODP
BufferOverflow - Offensive point of View
PPTX
Buffer overflow
PPT
Buffer Overflows
PDF
Ceh v5 module 20 buffer overflow
PPTX
test
PPTX
antoanthongtin_Lesson 3- Software Security (1).pptx
PPTX
Buffer overflow attack
PPTX
Golf teamlearnerlecture
PDF
Presentation buffer overflow attacks and theircountermeasures
ODP
Introduction to Binary Exploitation
PDF
2 buffer overflows
PPTX
Stack-Based Buffer Overflows
PDF
Buffer overflow null
PPSX
Ids 008 buffer overflow
PPT
Buffer OverFlow
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Buffer overflow explained
Buffer overflow
bufferoverflow-151214121251 presentation
Buffer OverFlow Exploit
BufferOverflow - Offensive point of View
Buffer overflow
Buffer Overflows
Ceh v5 module 20 buffer overflow
test
antoanthongtin_Lesson 3- Software Security (1).pptx
Buffer overflow attack
Golf teamlearnerlecture
Presentation buffer overflow attacks and theircountermeasures
Introduction to Binary Exploitation
2 buffer overflows
Stack-Based Buffer Overflows
Buffer overflow null
Ids 008 buffer overflow
Buffer OverFlow
Ad

More from Ajin Abraham (20)

PDF
AppSec PNW: Android and iOS Application Security with MobSF
PDF
Injecting Security into Web apps at Runtime Whitepaper
PDF
Injecting Security into vulnerable web apps at Runtime
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
PDF
Hacking Tizen: The OS of everything - Whitepaper
PPTX
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
PPTX
Abusing Exploiting and Pwning with Firefox Addons
PPTX
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
PPTX
Abusing Google Apps and Data API: Google is My Command and Control Center
PPTX
Exploit Research and Development Megaprimer: Win32 Egghunter
PPTX
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
PPTX
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
PDF
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
PPTX
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons
AppSec PNW: Android and iOS Application Security with MobSF
Injecting Security into Web apps at Runtime Whitepaper
Injecting Security into vulnerable web apps at Runtime
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Abusing Exploiting and Pwning with Firefox Addons
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Abusing Google Apps and Data API: Google is My Command and Control Center
Exploit Research and Development Megaprimer: Win32 Egghunter
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...
Abusing, Exploiting and Pwning with Firefox Add-ons

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Institutional Correction lecture only . . .
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Lesson notes of climatology university.
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Computing-Curriculum for Schools in Ghana
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Complications of Minimal Access Surgery at WLH
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Classroom Observation Tools for Teachers
Renaissance Architecture: A Journey from Faith to Humanism
O7-L3 Supply Chain Operations - ICLT Program
Basic Mud Logging Guide for educational purpose
Institutional Correction lecture only . . .
human mycosis Human fungal infections are called human mycosis..pptx
Lesson notes of climatology university.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Anesthesia in Laparoscopic Surgery in India
Computing-Curriculum for Schools in Ghana
Microbial disease of the cardiovascular and lymphatic systems
Insiders guide to clinical Medicine.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
102 student loan defaulters named and shamed – Is someone you know on the list?
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Exploit Research and Development Megaprimer: Buffer overflow for beginners