Downloads: 122
India | Information Technology | Volume 4 Issue 3, March 2015 | Pages: 636 - 640
Exploit Development Research on x86 Windows Application: Buffer Overflow
Abstract: The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it
Keywords: Vulnerability Testing, Exploit Development, Bypass DEP, ASLR, SEH, Egg Hunting
How to Cite?: Geogen George, Sivasundaram R, "Exploit Development Research on x86 Windows Application: Buffer Overflow", Volume 4 Issue 3, March 2015, International Journal of Science and Research (IJSR), Pages: 636-640, https://www.ijsr.net/getabstract.php?paperid=SUB151984, DOI: https://dx.doi.org/10.21275/SUB151984