SlideShare a Scribd company logo
12/1/2016 Buffer Overflow Exploit (2)
file:///home/user/Desktop/queue/bufferover.html#(2) 1/8
Buffer Overflow Exploit
Suresh Krishna
12/1/2016 Buffer Overflow Exploit (2)
file:///home/user/Desktop/queue/bufferover.html#(2) 2/8
Table of Contents
1. What is Buffer Overflow?
2. Simple Program.
3. Worm of 1988.
4. Safer side.
12/1/2016 Buffer Overflow Exploit (2)
file:///home/user/Desktop/queue/bufferover.html#(2) 3/8
What is Buffer Overflow?
Buffer Overflow is a situation where a program overruns the buffer’s
boundary and overwrites adjacent memory locations.
By sending in data designed to cause a buffer overflow, it is possible to
write into areas known to hold executable code, and replace it with
malicious code.
Can be caused by using "gets".
12/1/2016 Buffer Overflow Exploit (2)
file:///home/user/Desktop/queue/bufferover.html#(2) 4/8
Pictoral View
12/1/2016 Buffer Overflow Exploit (2)
file:///home/user/Desktop/queue/bufferover.html#(2) 5/8
Simple Program
#include <stdio.h>
#include <string.h>
void secretfunction(void)
{
puts("You have been Hacked!!");
}
void pass(void)
{
char pass[10] = "zilogic";
char buff[20];
int flag = 0;
gets(buff);
if (!strcmp(buff, pass))
flag = 1;
if (flag)
puts("Password CorrectnAuthorization
Granted!!");
else
puts("Password Wrong");
}
int main(void)
{
printf("Enter Passwordn");
pass();
return 0;
}
12/1/2016 Buffer Overflow Exploit (2)
file:///home/user/Desktop/queue/bufferover.html#(2) 6/8
Worm of 1988
The Worm is named after its creator and releaser, Robert Tappan
Morris.
The worm made use of the buffer overflow vulnerability in the finger
program.
It took down nearly 10% of the Internet of that time.
12/1/2016 Buffer Overflow Exploit (2)
file:///home/user/Desktop/queue/bufferover.html#(2) 7/8
Alternatives
1. fgets()
2. getline();
12/1/2016 Buffer Overflow Exploit (2)
file:///home/user/Desktop/queue/bufferover.html#(2) 8/8
Thank You!

More Related Content

Similar to Buffer OverFlow Exploit (20)

PPSX
Ids 008 buffer overflow
jyoti_lakhani
 
PPTX
Buffer overflow
Abu Juha Ahmed Muid
 
PDF
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Dr. Ramchandra Mangrulkar
 
PPTX
Linux binary analysis and exploitation
Dharmalingam Ganesan
 
PDF
IRJET - Buffer Overflows Attacks & Defense
IRJET Journal
 
PPTX
Rust Hack
Viral Parmar
 
PPTX
Golf teamlearnerlecture
kairistiona
 
PPTX
Buffer overflow attack
Krish
 
PPTX
nullcon 2011 - Fuzzing with Complexities
n|u - The Open Security Community
 
DOCX
What
anity
 
DOCX
Chroot Protection and Breaking
Anton Chuvakin
 
PPT
Chapter 6 pc
Hanif Durad
 
PDF
Buffer Overflow Prone Function Detection
Sanjay Rawat
 
PDF
Dry-wit Overview
OSOCO
 
PDF
DotDotPwn v3.0 [GuadalajaraCON 2012]
Websec México
 
PDF
Guadalajara con 2012
Jaime Restrepo
 
PDF
Applications list
Jose Carlo Castro Escalante
 
PPTX
Buffer overflow
Evgeni Tsonev
 
DOCX
1Buttercup On Network-based Detection of Polymorphic B.docx
aryan532920
 
PPT
Virtual Memory ,Direct memory addressing and indirect memory addressing prese...
ITM University
 
Ids 008 buffer overflow
jyoti_lakhani
 
Buffer overflow
Abu Juha Ahmed Muid
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Dr. Ramchandra Mangrulkar
 
Linux binary analysis and exploitation
Dharmalingam Ganesan
 
IRJET - Buffer Overflows Attacks & Defense
IRJET Journal
 
Rust Hack
Viral Parmar
 
Golf teamlearnerlecture
kairistiona
 
Buffer overflow attack
Krish
 
nullcon 2011 - Fuzzing with Complexities
n|u - The Open Security Community
 
What
anity
 
Chroot Protection and Breaking
Anton Chuvakin
 
Chapter 6 pc
Hanif Durad
 
Buffer Overflow Prone Function Detection
Sanjay Rawat
 
Dry-wit Overview
OSOCO
 
DotDotPwn v3.0 [GuadalajaraCON 2012]
Websec México
 
Guadalajara con 2012
Jaime Restrepo
 
Applications list
Jose Carlo Castro Escalante
 
Buffer overflow
Evgeni Tsonev
 
1Buttercup On Network-based Detection of Polymorphic B.docx
aryan532920
 
Virtual Memory ,Direct memory addressing and indirect memory addressing prese...
ITM University
 

Recently uploaded (20)

PDF
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
PDF
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
PPTX
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
PPTX
WHO And BIS std- for water quality .pptx
dhanashree78
 
PDF
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
PPTX
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
PPSX
OOPS Concepts in Python and Exception Handling
Dr. A. B. Shinde
 
PPTX
Introduction to Python Programming Language
merlinjohnsy
 
PDF
01-introduction to the ProcessDesign.pdf
StiveBrack
 
PPTX
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
PDF
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
PPT
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
PDF
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
PDF
PRIZ Academy - Process functional modelling
PRIZ Guru
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PPTX
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
 
PPT
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
PPTX
CST413 KTU S7 CSE Machine Learning Introduction Parameter Estimation MLE MAP ...
resming1
 
PDF
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
WHO And BIS std- for water quality .pptx
dhanashree78
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
OOPS Concepts in Python and Exception Handling
Dr. A. B. Shinde
 
Introduction to Python Programming Language
merlinjohnsy
 
01-introduction to the ProcessDesign.pdf
StiveBrack
 
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
PRIZ Academy - Process functional modelling
PRIZ Guru
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
 
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
CST413 KTU S7 CSE Machine Learning Introduction Parameter Estimation MLE MAP ...
resming1
 
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
Ad

Buffer OverFlow Exploit

  • 1. 12/1/2016 Buffer Overflow Exploit (2) file:///home/user/Desktop/queue/bufferover.html#(2) 1/8 Buffer Overflow Exploit Suresh Krishna
  • 2. 12/1/2016 Buffer Overflow Exploit (2) file:///home/user/Desktop/queue/bufferover.html#(2) 2/8 Table of Contents 1. What is Buffer Overflow? 2. Simple Program. 3. Worm of 1988. 4. Safer side.
  • 3. 12/1/2016 Buffer Overflow Exploit (2) file:///home/user/Desktop/queue/bufferover.html#(2) 3/8 What is Buffer Overflow? Buffer Overflow is a situation where a program overruns the buffer’s boundary and overwrites adjacent memory locations. By sending in data designed to cause a buffer overflow, it is possible to write into areas known to hold executable code, and replace it with malicious code. Can be caused by using "gets".
  • 4. 12/1/2016 Buffer Overflow Exploit (2) file:///home/user/Desktop/queue/bufferover.html#(2) 4/8 Pictoral View
  • 5. 12/1/2016 Buffer Overflow Exploit (2) file:///home/user/Desktop/queue/bufferover.html#(2) 5/8 Simple Program #include <stdio.h> #include <string.h> void secretfunction(void) { puts("You have been Hacked!!"); } void pass(void) { char pass[10] = "zilogic"; char buff[20]; int flag = 0; gets(buff); if (!strcmp(buff, pass)) flag = 1; if (flag) puts("Password CorrectnAuthorization Granted!!"); else puts("Password Wrong"); } int main(void) { printf("Enter Passwordn"); pass(); return 0; }
  • 6. 12/1/2016 Buffer Overflow Exploit (2) file:///home/user/Desktop/queue/bufferover.html#(2) 6/8 Worm of 1988 The Worm is named after its creator and releaser, Robert Tappan Morris. The worm made use of the buffer overflow vulnerability in the finger program. It took down nearly 10% of the Internet of that time.
  • 7. 12/1/2016 Buffer Overflow Exploit (2) file:///home/user/Desktop/queue/bufferover.html#(2) 7/8 Alternatives 1. fgets() 2. getline();
  • 8. 12/1/2016 Buffer Overflow Exploit (2) file:///home/user/Desktop/queue/bufferover.html#(2) 8/8 Thank You!