All Hokie, All the Time. Period. Presented by

The Lounge Board

Synaesthesia

Joined: 07/25/2008 Posts: 5017
Likes: 1729


Fundamentally, you're asking how software interacts with hardware


Most exploits rely on creating input to the software that causes it behave in an unexpected way, causing it to execute instructions to hardware not originally intended. To fill that in with an appropriate level of detail would probably take half a bachelor's degree worth of lectures in computer architecture, software, hardware, etc. But you could also start with this link, and every time you encountered a term you don't know what it is, click the clink to its own Wikipedia article, or search Google for that term, and gain as deep a level of understanding as you feel like.

(In response to this post by DW Hokie)

Link: Buffer overflows


Posted: 04/13/2019 at 12:03PM



+1

Insert a Link

Enter the title of the link here:


Enter the full web address of the link here -- include the "http://" part:


Current Thread:

Tech Sideline is Presented By:

Our Sponsors

vm307