Let’s talk about buffer overflow

A buffer overflow, or buffer overrun, occurs when more extra data is put into a fixed-length buffer than the buffer can manage.

Buffer overflow is possibly the best-known form of software security vulnerability. Most software developers know what a buffer overflow vulnerability is, but buffer overflow attacks corresponding to both legacy and newly-developed applications are still quite obvious. Part of the difficulty is due to the wide category of ways buffer overflows can happen, and part is due to the error-prone procedures often used to prevent them.

--

--

--

Blogger | Security Researcher | Digital forensic analyst | Twitter — @mrunal110

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to use logical functions in excel: AND, OR, NOT, and XOR || DataWitzz

How to use logical functions in excel

How to Configure SSL for AWS Elastic Beanstalk Environment ☁️

The correct approach to learning software development — Part 2

Smart LED (IoT)DIY

I went on an Android Learning Spree. Here’s the new stuff that I’ve learnt.

6 Best Online Courses for AWS Solution Architect Professional Certification Exam in 2022

6 Best Online Courses for AWS Solution Architect Professional Certification Exam

Automated Testing of Web Push Notifications

Apple’s Missing Manual: How to set up a Developer Account

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
MRunal

MRunal

Blogger | Security Researcher | Digital forensic analyst | Twitter — @mrunal110

More from Medium

Phishing 101: The Abracadabra Coin Bait They Haven’t Warned you About!

What I Learned This Week In Cyber 6/16/22

San Diego CTF 2022 — Six-Bites

Previse-HTB-Writeup