| Buffer overflow attack technology is a very efficient attack technology based on network. The studying of this technology is of great significance to information war of our army now and in the future. The paper mainly expatiates some kinds attacking detail of this technology. Buffer overflow attack mainly includes stack overflow, heap overflow and format string overflow and so on. The article analyses the causes of 5 kinds buffer overflow vulnerability under Linux operate system in detail, and expounds the principle of this series vulnerabilities exploiting technology. And the article analyses 3 typical vulnerability instances, and describes general exploiting method. The article also introduces 3 technologies of executive flow switching. The paper emphasizes on the method of writing binaryexecutive code used in attacking--shellcode and the improvement of the shellcodefor breaking through environment restriction. We discuss the development of "execute script shellcode" . The article illustrates architecture of the buffer overflow attack platform developed by our project group. At the end of the article, we analyze the cause of the vulnerability, and introduce the protection measure against this vulnerability, and bring forward the plan of the next step. |