Font Size: a A A

Under Linux Buffer Overflow Attacks, A Technology Research

Posted on:2004-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:S Z LiuFull Text:PDF
GTID:2208360095956020Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Buffer overflow attack technology is a very efficient attack technology based on network. The studying of this technology is of great significance to information war of our army now and in the future. The paper mainly expatiates some kinds attacking detail of this technology. Buffer overflow attack mainly includes stack overflow, heap overflow and format string overflow and so on. The article analyses the causes of 5 kinds buffer overflow vulnerability under Linux operate system in detail, and expounds the principle of this series vulnerabilities exploiting technology. And the article analyses 3 typical vulnerability instances, and describes general exploiting method. The article also introduces 3 technologies of executive flow switching. The paper emphasizes on the method of writing binaryexecutive code used in attacking--shellcode and the improvement of the shellcodefor breaking through environment restriction. We discuss the development of "execute script shellcode" . The article illustrates architecture of the buffer overflow attack platform developed by our project group. At the end of the article, we analyze the cause of the vulnerability, and introduce the protection measure against this vulnerability, and bring forward the plan of the next step.
Keywords/Search Tags:buffer overflow, vulnerability, attack, shellcode
PDF Full Text Request
Related items