全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
Redifis  2012 

Performing and Detecting NOP Sled Exploitation against the NetBIOS Service in Windows Systems

Keywords: Backtrack , Metasploit , Nmap , Snort , penetration test , vulnerability , mapping , SMB , NetBIOS , unauthorized access , NOP Sled , buffer , stack , overflow , TCP header

Full-Text   Cite this paper   Add to My Lib

Abstract:

Computer security has always been affected by tools for network scanning and vulnerability exploitation. These tools can be used to gain unauthorized access to system resources in orderto scale privileges and obtain private information. Additionally, exploitation tools usually relies on buffer overflow vulnerabilities to craft dangerous and effective attacks, bypassing securitycontrols and protection devices like firewalls, antivirus software, among others. In this article, we use Nmap and Metasploit to scan vulnerable network services and exploit them in order to see theimpacts of an attack when it is used to gain privileges. Later, Snort is used to detect an attack based on NOP Sled buffer overflows in order to analyse its operation when corrupting TCP headers.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413