32-BIT
A 32-bit stack-based buffer overflow can occur when a program copies more data into a fixed-size stack buffer than allocated, overwriting adjacent stack metadata (saved EBP and the 4-byte saved return address, EIP), which an attacker can potentially control. Below are the five main steps to identify and exploit the buffer overflow vulnerability:
Fuzzing Parameters
Controlling EIP
Identifying Bad Characters
Finding a Return Instruction
Jumping to Shellcode
Last updated