Solved

Buffer overflows

Posted on 2004-09-01
3
304 Views
Last Modified: 2010-04-11
g'day experts,

I am researching web application security and I wonder if anyone knows a good example of a buffer overflow attack on a company web site that is either well documented or which they could expalin.

All i can get at the moment is definitions and decriptions, I really need an example of an attack that has occured. It has to be one that targeted a web applcation.

thank you
0
Comment
Question by:claracruz
3 Comments
 
LVL 23

Assisted Solution

by:Tim Holman
Tim Holman earned 150 total points
ID: 11956147
Code Red is probably the better known example:

http://www.cert.org/advisories/CA-2001-19.html
0
 
LVL 5

Accepted Solution

by:
rsriprac earned 150 total points
ID: 11960899
I like using:

http://icat.nist.gov/icat.cfm

And just search "Buffer overflow", and you should get a good list from there.  For some of the adviserires they will give some proof of concepts.

Also if your are a real noob, you should start here:

http://www.securiteam.com/securityreviews/5OP0B006UQ.html

-Ram
0
 
LVL 1

Assisted Solution

by:CoopR
CoopR earned 200 total points
ID: 11965181
Try http://www.infosecwriters.com/hhworld/hh8/WideChapter.txt

While not a bufferflow for a webserver ithe basics are still the same regardless of what  it's targeting and it is very well documented.

If your looking for real life forensics reports then that may be tough, I'd imagine most companies keep that sort of thing confidential. I would recomend looking at the hackers challenge books, they have excellent examples bassed on real life situations. http://www.amazon.co.uk/exec/obidos/ASIN/0072193840/ref=pd_sim_b_dp_5/202-4673388-5023834
0

Featured Post

Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Join & Write a Comment

If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now