1. Locating Public Exploits
1
Online Exploit Resources
14 Fixing Exploits14.1 Fixing Memory Corruption Exploits14.1.1 Buffer Overflow in a Nutshell14.1.2 Importing and Examining the Exploit14.1.3 Cross-Compiling Exploit Code14.1.4 Fixing the Exploit14.1.5 Changing the Overflow Buffer14.2 Fixing Web Exploits14.2.1 Considerations and Overview14.2.2 Selecting the Vulnerability and Fixing the Code14.2.3 Troubleshooting the “index out of range” Error14.3 Wrapping Up15 Locating …
8 min read
2
Offline Exploit Resources
d
8 min read