%0 Journal Article %T Performing and Detecting NOP Sled Exploitation against the NetBIOS Service in Windows Systems %A Marcelo Cano %A Wilson Castro %A Carlos MuŁżoz %A Cristian Yaselga %J Redifis %D 2012 %I Escuela Polit¨Ścnica Nacional %X Computer security has always been affected by tools for network scanning and vulnerability exploitation. These tools can be used to gain unauthorized access to system resources in orderto scale privileges and obtain private information. Additionally, exploitation tools usually relies on buffer overflow vulnerabilities to craft dangerous and effective attacks, bypassing securitycontrols and protection devices like firewalls, antivirus software, among others. In this article, we use Nmap and Metasploit to scan vulnerable network services and exploit them in order to see theimpacts of an attack when it is used to gain privileges. Later, Snort is used to detect an attack based on NOP Sled buffer overflows in order to analyse its operation when corrupting TCP headers. %K Backtrack %K Metasploit %K Nmap %K Snort %K penetration test %K vulnerability %K mapping %K SMB %K NetBIOS %K unauthorized access %K NOP Sled %K buffer %K stack %K overflow %K TCP header %U http://redifis.epn.edu.ec/index.php/ReDiFIS/article/view/24