National Repository of Grey Literature 6 records found  Search took 0.00 seconds. 
Exploits of Programs Written in C Language
Buček, Hynek ; Kněžík, Jan (referee) ; Procházka, Boris (advisor)
This thesis deals with exploiting techniques, using programming errors of C language programs. Work is mainly focused on problems such as: buffer overflow, stack overflow, heap overflow, BSS overflow, format string overflow and integer overflow. Document also describes some of the current counter-measures prevent misuse of these errors. To help understand this topic in the first introductory part is a short chapter focusing on a theoretical basis. The following chapters principles described in detail the various types of attacks. On the end of work we find chapter about security.
Code Analyzer for C Language
Ovšonka, Daniel ; Orság, Filip (referee) ; Procházka, Boris (advisor)
This thesis deals with the principles of program exploitation and detection of potential vulnerabilities in the programs. This detection system offers to create safer program structures. At the beginning of the work the reader is familiarized with the basics of C programming language, assembly language and the GCC compiler. He is also introduced into the matter of exploitation techniques such as buffer overflow, heap overflow, BSS overflow, format string exploits and integer overflow. This work also describes the concept, implementation and results generated by application.
Polymorphic Shellcode
Plocek, Radovan ; Ďurfina, Lukáš (referee) ; Křoustek, Jakub (advisor)
This paper describes important information relevant to creating and using of polymorphic shellcodes. It contains informations about virtual adress space layout on Windows and Linux, about processor's registers and classical shellcodes, which are basics of polymorphic shellcodes. The primary objective of this paper is a construction of an advanced generator of polymorphic shellcodes. It can be used for testing the performance of systems based on a signature detection. It is possible to combine various methods and their level by specification of arguments at program's start-up.
Exploits of Programs Written in C Language
Buček, Hynek ; Kněžík, Jan (referee) ; Procházka, Boris (advisor)
This thesis deals with exploiting techniques, using programming errors of C language programs. Work is mainly focused on problems such as: buffer overflow, stack overflow, heap overflow, BSS overflow, format string overflow and integer overflow. Document also describes some of the current counter-measures prevent misuse of these errors. To help understand this topic in the first introductory part is a short chapter focusing on a theoretical basis. The following chapters principles described in detail the various types of attacks. On the end of work we find chapter about security.
Polymorphic Shellcode
Plocek, Radovan ; Ďurfina, Lukáš (referee) ; Křoustek, Jakub (advisor)
This paper describes important information relevant to creating and using of polymorphic shellcodes. It contains informations about virtual adress space layout on Windows and Linux, about processor's registers and classical shellcodes, which are basics of polymorphic shellcodes. The primary objective of this paper is a construction of an advanced generator of polymorphic shellcodes. It can be used for testing the performance of systems based on a signature detection. It is possible to combine various methods and their level by specification of arguments at program's start-up.
Code Analyzer for C Language
Ovšonka, Daniel ; Orság, Filip (referee) ; Procházka, Boris (advisor)
This thesis deals with the principles of program exploitation and detection of potential vulnerabilities in the programs. This detection system offers to create safer program structures. At the beginning of the work the reader is familiarized with the basics of C programming language, assembly language and the GCC compiler. He is also introduced into the matter of exploitation techniques such as buffer overflow, heap overflow, BSS overflow, format string exploits and integer overflow. This work also describes the concept, implementation and results generated by application.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.