Saltar a la navegación Saltar al contenido principal Ir al pie de página

Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP

As the number of products providing protection against buffer overflow exploits on the stack, non-stack based over flow exploit will become more and more common. In this paper we will start by explaining the differences between a stack-based overflow and a non-stack based overflow, then explain how to write a non-stack based exploit. 

Download whitepaper