Professional Documents
Culture Documents
Hijacking M
Hijacking M
Hijacking M
Introduction
Attacker’s goals
Buffer overflow attacks
Integer overflow attacks
Format string vulnerabilities
Reference
INTRODUCTION
• A control hijack attack is done by overwriting some
of the data structures in a victim program.
• The attacker takes control of a communication.
• The attacker uses a program that appears to be the
server to the client and appears to be the client to the
server .
• It is also known as the man in middle attack.
ATTACKER’S GOALS
Takeover target machine(for example web server)