c - Books and shellcode examples -
I've read "The Art of Exploitation" and "Gray Hat Hacker". Examples of these books are examples written for x86 systems. I Centrino laptop and an MD 64 PC. I can not create an example of work for stack based overflow
64 Using ASLR -BB system, executable location security to execute such attacks Makes it more difficult. This can explain to you why you failed to work them.
I suggest reading x86-64 buffer overflow exploitation for more information.
Comments
Post a Comment