You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: buffer_overflow/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ https://youtu.be/oS2O75H57qU
8
8
9
9
One of the simplest "pwn" attacks is a buffer overflow. The idea is that a faulty program has allocated a buffer of a certain size, but allows you to write more than that size.
10
10
11
-
For example, `input_buffer` is only 16 bytes, but `gets` allows you to input as many characters as you want. So at some point you are writing over memory you are not supposed to, and we can use this to our advantage!
11
+
For example, `input_buffer` is only 16 bytes, but `fgets` is called in a way that allows up to 32 bytes to be read. So at some point you are writing over memory you are not supposed to, and we can use this to our advantage!
0 commit comments