Curriculum
Course: Cyber Security
Login

Curriculum

Cyber Security

Text lesson

CS Network Attacks

Network protocols and applications, particularly web apps, are frequently targeted due to vulnerabilities like buffer overflows. Tools like EyeWitness can aid in assessing attack surfaces by capturing screenshots of network assets after port scanning. Exploiting these vulnerabilities often leads to Remote Code Execution (RCE).

Buffer Overflow

Exploiting network services often involves manipulating memory management, with languages like C and C++ being more prone to vulnerabilities like Buffer Overflows. In contrast, languages like Java, Python, and C# limit memory control, reducing risks. Buffer Overflows occur when unsanitized input overwrites the Return Pointer in the Stack, allowing attackers to control execution flow.

Note: The stack memory structure is where a program stores the variables and information necessary for its operation. It is located within a computer’s RAM (Random Access Memory).