Abstract:
In present, there are a lot of companies which create software solutions, for different purposes, but only few of them are doing this well. A software application is a system of components, which are interconnected and working together, and as any complex system it has vulnerabilities (bugs). Most common vulnerabilities are based on buffer overflow errors. This paper describes the whole process of software exploitation, from identifying the bug to writing the exploit. Also it contains some techniques which will defend our applications from this type of errors.