Auth0x78forGDSC NIT Silchar Blogblog.gdscnits.in·Nov 25, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...Gagan G Saralaya and 1 other are discussing this2 people are discussing thisDiscuss·2 likes·215 readsBuffer Overfow
Auth0x78auth0x78-blog.hashnode.dev·Oct 10, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...Discuss·1 like·42 readsBuffer Overfow
Wizard079forCOPS IIT BHUblogs.copsiitbhu.co.in·Oct 1, 2024Understanding Buffer Overflows: A Beginner's Guide - Part 2This article is a 2nd part of https://blogs.copsiitbhu.co.in/understanding-buffer-overflows-a-beginners-guide-part-1 make sure you have read that for understanding it In this article, we will dive into the binary and see what’s going on; for that, we...Discuss·11 likes·82 readsProgramming Blogs
UjjawalKforCOPS IIT BHUblogs.copsiitbhu.co.in·Sep 23, 2024Understanding Buffer Overflows: A Beginner's Guide - Part 1This article is a 2 part series and this is the first article. In this article, we’ll discuss basic prerequisites to understand buffer overflows. Any program we run, runs in specified block(s) of memory. This memory is called the address space of the...Discuss·70 likes·301 readsSecurity
Akash Reddy Jammulaakashrj.hashnode.dev·Aug 31, 2024Understanding Buffer Overflow Attacks: A Deep DiveImagine you're filling a glass with water. Normally, you'd stop pouring when the glass is full. But what if you kept pouring? The water would spill over the edges, creating a mess. In the world of cybersecurity, a similar concept exists—it's called a...DiscussWeb Development
Achal Tiwariachaltiwari.hashnode.dev·Jul 22, 2024ShellCode 1.0Hey there! Today, we're diving into the fascinating and somewhat intimidating world of shellcode. If you've ever wondered how hackers manage to take control of a compromised machine, shellcode is often a big part of the answer. Let's break it down to...DiscussMalware
Gaurav Chaudharypixelgig.pro·Mar 31, 2024Learning Cyber Security Day 5 - Common Coding Vulnerabilities🥉Hey security-conscious coders! We've been fortifying our code with encryption and secure coding practices. Today, we shift gears and delve into the enemy's playbook – common coding vulnerabilities that hackers exploit to gain access to systems and st...DiscussCybersecurity Bootcamp: My Daily Grind to Expertisecybersecurity
Jyotiprakash Mishrablog.jyotiprakash.org·Dec 28, 2023Secure Coding in CWriting secure code in C is crucial to preventing common vulnerabilities such as buffer overflows, injection attacks, and more. Here are some ways to enhance the security of your C code: Input Validation: Ensure that all user inputs are validated an...DiscussC Programmingbounds checking
Anusha Shanbhoganushaa.hashnode.dev·Oct 16, 2023Buffer OverflowWhat is a Buffer? A buffer is a portion of physical storage memory designated for the temporary storage of data during its transfer from one location to another. Typically, these buffers are situated in Random Access Memory (RAM) and serve the purpos...Discuss·4 likes·109 reads#cybersecurity
Hung Ngohungoboss.hashnode.dev·Sep 7, 2023Buffer Overflow and ExploitationBuffer overflows are as old as the world itself. Even though it is not that fresh, it is still one of the most exploited vulnerabilities that can often lead to other vulnerabilities. When I was younger, I was originally taught how to code in C, the l...Discuss·28 readsexploit