Abstract:
This paper describes the technical principles of buffer overflow, and analyzes the methods and features of network attack based on buffer overflow in Windows environment, then gives the development process of exploiting a buffer overflow on Windows. An example of exploiting a buffer overflow in a ftp software is presented to verify the validity of the development process.
Key words:
buffer overflow,
Windows,
vulnerability exploitation
摘要: 给出了缓冲区溢出的原理,分析了Windows平台下利用缓冲区溢出漏洞进行网络攻击的方法和特征,在此基础上提出了Windows平台下缓冲区溢出漏洞利用的开发流程。通过一个存在缓冲区溢出漏洞的ftp软件的利用实例验证了这个开发流程的有效性。
关键词:
缓冲区溢出,
Windows,
漏洞利用
CLC Number:
YU Jun-song; ZHANG Yu-qing; SONG Yang; LIU Qi-xu. Vulnerability Exploitation of Buffer Overflow on Windows[J]. Computer Engineering, 2007, 33(17): 162-164.
余俊松;张玉清;宋 杨;刘奇旭. Windows下缓冲区溢出漏洞的利用[J]. 计算机工程, 2007, 33(17): 162-164.