Title: Buffer Overflow Attacks: Detect, Exploit, Prevent Author(s): James C. Foster Pages: 520 Publisher: Syngress Publication date: 2004 Language: English Format: PDF ISBN-10: ISBN-13: Description: Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisti-cated hackers vulnerability of choice.
These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of custom exploits.
These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster.