O'Reilly logo

Certified Ethical Hacker Exam Prep by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11Buffer Overflows, Viruses, and Worms

This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives, which buffer overflows and malicious code. You will need to know specific items such as

Understand the types of buffer overflows

Image Stack smashing and heap-based buffer overflows are the two types of buffer overflows.

Understand the skills required to launch buffer overflow attacks

Image This includes knowledge of programming and knowledge of the program’s key parameters. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required