Subscribe
Hide Description
Explain what buffer overflow attacks are and how they are created to attack our software. And, describe the best security measures you would recommend mitigate these buffer overflow attacks.
Buffer overflow attacks occurs when hackers sending a large amount of data than the buffer was intended to hold, this large amount data immediately overwrite and corrupt other data in the buffer. Data contain codes to trigger specific actions that controls the program execution path and hijack the control of the program to execute the hacker 's code instead of the system process code. It could change and modify user data, disclose sensitive information, brings down applications and lock up the system or applications.
Hackers can use a buffer overflow to cause havoc to a web application, hack into the web server, gain control of a corporate machine, launch programs/commands from the stack. A buffer overflow can be used …show more content…
Code auditing in automated and manual.
Use higher level programming languages that disallow direct memory access.
Use compilers that protect against stack overflows. Developer can write programs in Java instead of C to prevent buffer overflow.
Use StackGuard or other compiler tools like StackShield or Libsafe to hardens programs against stack overflow attacks, detects and defeats stack smashing attack.
Any field of entry or input could be a potential point of vulnerability for buffer overflow. Input must be validate to prevent unexpected data for being process.
References:
EC-Council, (2000). Ethical Hacking and Countermeasures Threats and Defense Mechanisms. Clifton Park, N.Y. Cengage