Downloads: 121 | Views: 306
Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015 | Popularity: 6.2 / 10
Exploit Development Research on x86 Windows Application: Buffer Overflow
Geogen George, Sivasundaram R
Abstract: The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it
Keywords: Vulnerability Testing, Exploit Development, Bypass DEP, ASLR, SEH, Egg Hunting
Edition: Volume 4 Issue 3, March 2015
Pages: 636 - 640
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 99
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Downloads: 109
Research Paper, Information Technology, Burkina Faso, Volume 8 Issue 10, October 2019
Pages: 1468 - 1471The Determinants of Internet Adoption among Urban Heads of Household in Burkina, Faso
KABORE Theophile
Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Information Technology, Kenya, Volume 7 Issue 11, November 2018
Pages: 1510 - 1514Organizational Capabilities and E-Waste Management: A Theoretical Review
Sophia Jeptarus Kipkoech, David M. Nzuki