Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP

As the number of products providing protection against buffer overflow exploits on the stack, non-stack based over flow exploit will become more and more common. In this paper we will start by explaining the differences between a stack-based overflow and a non-stack based overflow, then explain how to write a non-stack based exploit. 

Download whitepaper

Call us before you need us.

Our experts will help you.

Get in touch
%d bloggers like this: