About 216,000 results
Open links in new tab
  1. Buffer Overflow - OWASP Foundation

    In a classic buffer overflow exploit, the attacker sends data to a program, which it stores in an undersized stack buffer. The result is that information on the call stack is overwritten, including …

  2. What Is Buffer Overflow? Attacks, Types & Vulnerabilities ...

    Buffer overflow is a software coding error that enables hackers to exploit vulnerabilities, steal data, and gain unauthorized access to corporate systems. Discover what is a buffer overflow …

  3. Buffer Overflow Attack with Example - GeeksforGeeks

    Jan 29, 2025 · In a buffer-overflow attack, the extra data sometimes holds specific instructions for actions intended by a hacker or malicious user; for example, the data could trigger a response …

  4. A Pentester's Guide to Exploiting Buffer Overflow ... - Cobalt

    Apr 24, 2023 · Learn how attackers exploit buffer overflow vulnerabilities and how to protect yourself with this step-by-step guide.

  5. Buffer Overflow - CTF Handbook - CTF101

    A Buffer Overflow is a vulnerability in which data can be written which exceeds the allocated space, allowing an attacker to overwrite other data. The simplest and most common buffer …

  6. Buffer Overflow Exploitation - PenTesting.Org

    Jan 22, 2025 · Understanding how buffer overflows work and how to exploit them ethically during penetration testing helps security professionals identify and fix these critical vulnerabilities …

  7. Buffer Overflow: From Basics to Exploitation - DEV Community

    Feb 17, 2025 · This article provides a hands-on guide to exploiting a buffer overflow, one of the most well-known and impactful software vulnerabilities. You'll learn how an attacker can …