Chapter 11. Buffer Overflows, Viruses, and Worms

This chapter covers the following topics:

Image Buffer Overflows: Buffer overflows are one of the top means of attack and occur primarily because of poor bounds testing.

Image Viruses and Worms: This category of malware continues to be a real threat and can be used to launch many different types of attacks.

This chapter introduces you to buffer overflows and malicious code. Buffer overflows are a critical subject for the ethical hacker to review and understand. Many of the most successful attacks use a buffer-overflow ...

Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.