Skip to content

RUTHRAN-SEC/Buffer-Overflow-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

Project Title: Buffer Overflow Demonstration in C

The Project Description: This project is about a Buffer Overflow vulnerability program using C language. In this project we can see how unsafe input function can overwrite the memory when user enter lager input then the actual allocated buffer size.

A fixed size of array character [10 Bytes] is used. The program ask for user input and stores that into scanf("%s"), Which doesn't check for the input length.Entering large input can trigger Buffer Overflow.

Aim: Understanding how Buffer Overflow happens by knowing how scanf("%s") is an unsafe function that can lead to Overflow. When user enters large input the scanf("%s") doesn't check for the lenght, also we can observe how the C program behaves. Knowing the importents of input validation.

How Does the Buffer Overflow happens: In the C program Buffer size is fixed (10 bytes) When user enters a long string like ("abcdefghijk") more than 9 characters, Extra characters are moved to the nearby memory. where the nearby memory is overwritten that may crash the program or gives unexpected output.

This may cause: *Program crash *Corrupted variables *Unexpected output *Security vulnerabilities