Buffer overflow is not a new hacking technique. Back in 1988,
the original Morris worm had already used this technique to
hack into 6,000 machines. However, buffer overflow attacks are
still very popular nowadays. For example, the code red worm,
Apache/mod_ssl worm, MS-SQL worm, and the recent Blaster
worms, are all using the buffer overflow technique. This workshop
explains the basic buffer overflow mechanism and demonstrates
how we can use this technique to break into a system locally and
remotely. No special technical background is required in this workshop.
All are welcome. After the presentation, IE and INE students can apply
guest accounts to practice some buffer overflow programs and
hacking tools afterwards.