Skip to Content
Kali Linux Penetration Testing Bible
book

Kali Linux Penetration Testing Bible

by Gus Khawaja
June 2021
Intermediate to advanced content levelIntermediate to advanced
512 pages
11h 12m
English
Wiley
Content preview from Kali Linux Penetration Testing Bible

CHAPTER 16Buffer/Stack Overflow

In the previous chapter, you learned about the assembly instructions. After that, you saw how to use Immunity Debugger to visualize the internal instructions of a program (aka reverse engineering). This chapter will use what you have learned previously to exploit the stack using the buffer overflow technique. Before starting, you should already understand the basics of the assembly language instructions and should have practiced the examples in the previous chapter.

The topics that you will learn about in this chapter include the following:

  • Basics of the stack
  • How to exploit the stack
  • The workflow to achieve a buffer overflow

Basics of Stack Overflow

Now that you understand reverse engineering fundamentals, it’s time to start with something more meaningful to exploitation. In this section, we will see how to smash the stack with our hacking skills. We will outsmart the CPU and the regular stack manipulation to achieve our exploitation goals.

Stack Overview

Long story short, a stack is used to allocate short‐term storage for function parameters and local variables of that function. It’s important to know that a new stack is created every time we run a function. The size of the stack frame is fixed after the creation using the prologue instructions, and the stack frame is deleted at the end of the function (see Figure 16.1).

Snapshot of the Stack pointers.

Figure 16.1 ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition

Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition

Vijay Kumar Velu
Web Penetration Testing with Kali Linux - Third Edition

Web Penetration Testing with Kali Linux - Third Edition

Daniel W. Dieterle, Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Publisher Resources

ISBN: 9781119719083Purchase Link