Ethical.Hacking.2021.10:FUZZING FOR ZERO-DAY VULNERABILITIES

 This type of attack is
called a buffer over-read, as we can read beyond the bounds of the
designated memory buffer. Similarly, in a buffer overflow attack, a
hacker uses a bug to write beyond the bounds of a designated
buffer. Hackers often use buffer overflow attacks to upload reverse
shells that allow them to control the machine remotely. This process
is called remote code execution (RCE)

maximum transmission unit (MTU) 

猜你喜欢

转载自blog.csdn.net/lm19770429/article/details/121931755