Quick Access

User login

Who's online

There are currently 0 users and 0 guests online.

Visitors Map

Site Counter

  • Site Counter: 493345
  • Registered Users: 57243
  • Published Nodes: 330
  • Your IP: 162.158.78.195
  • Since: 2008-09-09

Link Exchange

BlogCatalog Blog Directory
Technology Business Directory - BTS LocalTop stories
Click here
         SecGeeks
       Megapanzer

Live Traffic Info

July 2011

Introduction

One thing I have always maintained is that aspiring or practicing penetration testers who use an exploitation product (such as CANVAS, Core Impact, Metasploit) should know how buffer overflows actually work. Having this knowledge will help you understand the circumstances under which these products can work, will help you troubleshoot when things don't work and will correct unrealistic expectations about what the products are capable of.

In addition, being able to reproduce buffer overflow exploits will also give you the tools to more accurately assess the risk of discovered vulnerabilities as well as to develop effective countermeasures for exploits out in the wild. These are important skills for incident responders and for those attempting to protect their networks.
Read more..
Your rating: None Average: 3.7 (111 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

First say to yourself what you would be; and then do what you have to do.

Explore Tags

Follow Us