wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Explaining Buffer Overflow with Example

profile
Genius Ape
Dec 01, 2018
0 Likes
0 Discussions
573 Reads
Firdous Shaikh       Author : Firdous Shaikh     

Let’s understand Buffer Overflow

A buffer is a temporary area for data storage (also used for storing program code). When more data (than was originally allocated to be stored) gets placed by a program or system process, the extra data overflows. It causes some of that data to leak out into other buffers, which can corrupt or overwrite whatever data they were holding. If this overwrites adjacent data or executable code, this may result in wrong program behaviour, including memory access errors, incorrect results, and crashes. Exploiting the behaviour of a buffer overflow is a well-known security exploit. On many systems, the memory layout of a program, or the system as a whole, is well defined. By sending in data designed to cause a buffer overflow, it is possible to write into areas known to hold executable code and replace it with malicious code.

The Buffer Overflow attack example

C and C++ programming languages provide no built-in protection against accessing or overwriting data in any part of memory and do not automatically check, whether the data written in the data-type is within its boundaries. So here, we use an array which is a built-in buffer data type, that can intake inputs for our demo. The program works perfect when the inputs are inside the range, but when value size increases the range, the access violation, segmentation fault error is encountered by the user, given by the system:  

***stack smashing detected***: [execution] terminated

Aborted (core dumped)

  Our program is prototype to a larger and more diverse attack consequence, and much fierce attacks can take down entire RAM capacities to crash (also traits of a Denial of Service attack).   The Program… Explained!  
  1. The program starts with creating a character buffer, in which we will pass a string to test its range.
  2. The buffer (array) here, is 5 bytes plus the terminating NULL.
  3. Thus Maximum allocation can be 2 double words, i.e. we need to input more than 8 bytes for the buffer overflow to take place.
  4. That the user does not provide a value, the program handles that by terminating.
  5. If there is an input, the strcpy() copies the user input to the buffer, without any bound checking.
  6. Finally, the output is according to the input range.
        The Program
#include <stdio.h> #include <string.h> #include <stdlib.h> int main(int argc, char *argv[]) { char buffer[5]; if (argc < 2) { printf("strcpy() NOT executed....\n"); printf("Syntax: %s <characters>\n", argv[0]); exit(0); } strcpy(buffer, argv[1]); printf("buffer content= %s\n", buffer); // you may want to try strcpy_s() printf("strcpy() executed...\n"); return 0; }  
  Steps for execution (The C program can be run in its compiler, over all platforms. Here we have used Ubuntu Linux).  
  1. Save the program in any editor with the extension .cpp (blowfish.cpp)
  2. Make sure you have the compiler, interpreter installed. In the terminal, type the following.

sudo apt-get install g++

sudo apt-get update

 
  1. To compile the program, type:

g++ -g3 –ggdb -o0 –Wall –Wextra –unused –o BufferOverFlowOP bufferoverflow.cpp   –lcryptopp

 
  1. To run the program, type:

./BlowfishOP [input range]

      The Output: Buffer Overflow with Example

Comments ()


Sign in

Read Next

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Health is Wealth

Blog banner

WomenEmpowerment

Blog banner

Not anti-social, but pro-solitude

Blog banner

Trends that began during the pandemic

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Bit Coins

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Decoding Confusion Matrix

Blog banner

Memory Management

Blog banner

Major achievement

Blog banner

Cache Memory

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Business-to-Business

Blog banner

Memory Management in Operating System

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Shoulders

Blog banner

An Overivew Of Cache Memory

Blog banner

Virtual Memory

Blog banner

Impact of social media on the human life

Blog banner

Memory Management in Operating System

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Why Data Security Is Important

Blog banner

Virtual Memory

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

E-Governance

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Modern operating system

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

VIRUS

Blog banner

indian premier league

Blog banner

Functions Of Operating Systems

Blog banner

BITCOIN WALLET

Blog banner

De-Coding Love

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

How to Conquer Depression ?

Blog banner

Pandas Matrix Applications

Blog banner

Footprinting

Blog banner

Benefits and drawback of web security.

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner