32-BIT

A 32-bit stack-based buffer overflow can occur when a program copies more data into a fixed-size stack buffer than allocated, overwriting adjacent stack metadata (saved EBP and the 4-byte saved return address, EIP), which an attacker can potentially control. Below are the five main steps to identify and exploit the buffer overflow vulnerability:

  1. Fuzzing Parameters

  2. Controlling EIP

  3. Identifying Bad Characters

  4. Finding a Return Instruction

  5. Jumping to Shellcode

Last updated