Saturday, October 29

Class 8

During this week we talked about other vulnerabilitys and exploits that occur but one of the vulnerabilities that we focused during this class was the “BUFFER OVERFLOW”. During this week I found it to be an interesting topic, professor talked about various parts that go along vuln and exploits such as the following:
Buffer overflow
Format string
Memory leak
Race Condition
Spoofing

To explain all of these concepts it would take me pages and pages of writing, so I will just give a light briefing on it:

All of the term that I have written down are some of the vulnerabilities that a hacker could use to gain either access to your computer or any type of files or passwords stored in it.
How could this be done? Well if a program is using a protocol and the protocol isn’t safe, or it is just open for connection then guess what??? The attacker will take advantage of that protocol open and try to gain access to your computer. Same any type of software if there is any kind off flaw this is a big risk for the user.

This is a subject that anyone could talk to forever since there are many things that can go with it!

No comments:

Post a Comment