Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015
Exploit Development Research on x86 Windows Application: Buffer Overflow
Geogen George, Sivasundaram R
The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it
Keywords: Vulnerability Testing, Exploit Development, Bypass DEP, ASLR, SEH, Egg Hunting
Edition: Volume 4 Issue 3, March 2015
Pages: 636 - 640
How to Cite this Article?
Geogen George, Sivasundaram R, "Exploit Development Research on x86 Windows Application: Buffer Overflow", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151984, Volume 4 Issue 3, March 2015, 636 - 640
110 PDF Views | 100 PDF Downloads
Similar Articles with Keyword 'Vulnerability Testing'
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 636 - 640Exploit Development Research on x86 Windows Application: Buffer Overflow
Geogen George, Sivasundaram R
Similar Articles with Keyword 'SEH'
Research Paper, Information Technology, Burkina Faso, Volume 8 Issue 10, October 2019
Pages: 1468 - 1471The Determinants of Internet Adoption among Urban Heads of Household in Burkina, Faso
KABORE Theophile
Review Papers, Information Technology, Kenya, Volume 7 Issue 11, November 2018
Pages: 1510 - 1514Organizational Capabilities and E-Waste Management: A Theoretical Review
Sophia Jeptarus Kipkoech, David M. Nzuki
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 636 - 640Exploit Development Research on x86 Windows Application: Buffer Overflow
Geogen George, Sivasundaram R