Reversing Binaries for Identification of Vulnerabilities
This chapter discusses various vulnerabilities in an application. By using case studies of real exploits it discusses the exploitation of vulnerabilities. The chapter also discusses the identification of these vulnerabilities by analyzing assembly code.
KeywordsReturn Address Exception Handler Buffer Overflow Assembly Code Format String
Unable to display preview. Download preview PDF.