Articles Blog | G5 Cyber Security

Research – Smashing The Stack, An Example From 2013

This whitepaper goes into detail on exploitation techniques to bypass modern security mechanisms cerated to mitigate the common buffer overflow in Linux.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/122853/smashstack2013.pdf

Source: https://packetstormsecurity.com/files/122853/Smashing-The-Stack-An-Example-From-2013.html

Exit mobile version