
Jul 4, 2021 - 5 min read
Husband 🤴🏻Hacker 💻 Developer 🤓 Scot 🏴
In this tutorial I will walk you through the process of overwriting the return value of an application using a Buffer Overflow. Requirements :
Why would we do this? As far as I am concerned there is no legitimate use for this technique however it is a useful skill to possess and understand how a Buffer Overflow works. Understanding these concepts will help you develop more secure applications.
What is a “Buffer Overflow”? Well put simply a buffer overflow is an attack vector where you attack an application by overflowing the memory location of a buffer leading to code leaking into the next memory location. This usually causes a Segmentation Fault (SIGSEGV in linux). Using this we can execute arbitrary code or cause the application to execute another piece of code within the application by overwriting the return value.
Will this harm my computer? Using this guide will not harm your computer unless you do something terribly wrong. Feel free to use a virtual machine.