From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Exploiting buffer overflows and creating payloads

Exploiting buffer overflows and creating payloads

From the course: Certified Ethical Hacker (CEH)

Exploiting buffer overflows and creating payloads

It can lead to a denial of service condition because a program can crash or the whole device can crash, right? This is something that has been very popular whether it's a Windows machine, a Linux box, Mac OS X and so on. I have a couple of examples of buffer overflows under my GitHub repository. So if you have a WebSploit, you already have a copy of my GitHub repository and that is under the h4cker directory, and if you go under the buffer_overflow_example, you basically see a few files in here. Now, I have a program that you have the source code, and it's also compiled here, and first, let me show you the source code of that program, and if you go to bad_code.c, and I'm just going to open that right now here, you don't have to be a programmer to actually know this. This is very simple, pretty self-explanatory. You have a C program, so a program written in C, that has the main function, and that main function is only executing another function called echo, and that function is right…

Contents