Exploit Development Research on x86 Windows Application: Buffer Overflow
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015

Exploit Development Research on x86 Windows Application: Buffer Overflow

Geogen George, Sivasundaram R

The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it

Keywords: Vulnerability Testing, Exploit Development, Bypass DEP, ASLR, SEH, Egg Hunting

Edition: Volume 4 Issue 3, March 2015

Pages: 636 - 640

Share this Article

How to Cite this Article?

Geogen George, Sivasundaram R, "Exploit Development Research on x86 Windows Application: Buffer Overflow", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151984, Volume 4 Issue 3, March 2015, 636 - 640

110 PDF Views | 100 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Vulnerability Testing'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 636 - 640

Exploit Development Research on x86 Windows Application: Buffer Overflow

Geogen George, Sivasundaram R

Share this Article

Similar Articles with Keyword 'SEH'

Research Paper, Information Technology, Burkina Faso, Volume 8 Issue 10, October 2019

Pages: 1468 - 1471

The Determinants of Internet Adoption among Urban Heads of Household in Burkina, Faso

KABORE Theophile

Share this Article

Review Papers, Information Technology, Kenya, Volume 7 Issue 11, November 2018

Pages: 1510 - 1514

Organizational Capabilities and E-Waste Management: A Theoretical Review

Sophia Jeptarus Kipkoech, David M. Nzuki

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 636 - 640

Exploit Development Research on x86 Windows Application: Buffer Overflow

Geogen George, Sivasundaram R

Share this Article
Top