International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122

Research Paper | Information Technology | Volume 4 Issue 3, March 2015 | Pages: 636 - 640 | India


Exploit Development Research on x86 Windows Application: Buffer Overflow

Geogen George, Sivasundaram R

Abstract: The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it

Keywords: Vulnerability Testing, Exploit Development, Bypass DEP, ASLR, SEH, Egg Hunting

How to Cite?: Geogen George, Sivasundaram R, "Exploit Development Research on x86 Windows Application: Buffer Overflow", Volume 4 Issue 3, March 2015, International Journal of Science and Research (IJSR), Pages: 636-640, https://www.ijsr.net/getabstract.php?paperid=SUB151984, DOI: https://dx.dx.doi.org/10.21275/SUB151984

Download Citation: APA | MLA | BibTeX | EndNote | RefMan


Download Article PDF


Rate This Article!


Top