Buffer over flow attack.

write a paper about the buffer over flow attack.

easy and simple sentences.

one page.

APA STYLE.

Answer preview

Consequently, data values in the memory get corrupted as well, and this can lead the program to crash (Gupta, 2012). Additionally, the overflow data is vulnerable to malicious manipulation. Two types of buffer overflow are usually likely; heap-based and stack-based overflow. Where the latter is more common and easier to execute. Therefore, Buffer Overflow Attack is the manipulation of leaked data for malicious intentions by hackers. The hackers damage the execution of the intended instruction by using the extra data to hold their instructions for specific attack executions. In stack-based buffer overflow, the attackers use the memory space that stores user input (stack), to exploit programs and applications (Chau, 2015). Therefore, attackers take advantage of data overflows to exploit programs and applications awaiting data input from users. In heap-based overflows, which are least familiar, attack applications by exploiting the memory reserved for a program. Therefore, attacks occur when bad practices in programming leave open vulnerabilities.

[343 Words]

Scroll to Top