equal
deleted
inserted
replaced
21 computer science students, but who said that criminal hackers |
21 computer science students, but who said that criminal hackers |
22 restrict themselves to everyday fare? Not to mention the |
22 restrict themselves to everyday fare? Not to mention the |
23 free-riding script-kiddies who use this technology without |
23 free-riding script-kiddies who use this technology without |
24 knowing what are the underlying ideas. |
24 knowing what are the underlying ideas. |
25 |
25 |
|
26 |
|
27 \bigskip |
|
28 For buffer overflow attacks to work a number of innocent |
|
29 design decisions, which are benign on their own, need to |
|
30 conspire against you. One such design decision is how the |
|
31 memory is laid out for each process. |
|
32 |
26 \bigskip\bigskip \noindent If you want to know more about |
33 \bigskip\bigskip \noindent If you want to know more about |
27 buffer overflow attacks, the original Phrack article |
34 buffer overflow attacks, the original Phrack article |
28 ``Smashing The Stack For Fun And Profit'' by Elias Levy (also |
35 ``Smashing The Stack For Fun And Profit'' by Elias Levy (also |
29 known as Aleph One) is an engaging read: |
36 known as Aleph One) is an engaging read: |
30 |
37 |