<--- Back to Details
First PageDocument Content
Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security
Date: 2014-10-26 12:55:03
Computing
Application security
Heap overflow
Qualys
Vulnerability
Metasploit Project
Shellcode
Exploit
Wireless security
Computer network security
Cyberwarfare
Computer security

Add to Reading List

Source URL: conference.hackinthebox.org

Download Document from Source Website

File Size: 940,12 KB

Share Document on Facebook

Similar Documents

Heap and BSS Overflow Ⅱ Arbro on-02-19

DocID: 1uD4u - View Document

Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

DocID: 1qEiC - View Document

Computing / Software engineering / Software bugs / Computer programming / Computer memory / C standard library / Address space layout randomization / Buffer overflow / Heap overflow / C dynamic memory allocation / Pointer / Memory safety

Data Randomization Cristian Cadar Microsoft Research Cambridge, UK

DocID: 1qxLg - View Document

Software bugs / Computing / Software engineering / Computer programming / Computer errors / Subroutines / Memory management / Stack / Buffer overflow / Call stack / Stack buffer overflow

b The heap sucks The Stack is Back – Jon Oberheide

DocID: 1pRdF - View Document

Web browsers / Pwn2Own / Hacking / Vulnerability / Safari / Heap spraying / Google Chrome / Exploit / Buffer overflow / Arbitrary code execution / Internet Explorer / Privilege escalation

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

DocID: 1p8BX - View Document