Skip to content

Commit a2c357a

Browse files
committed
update: resources
1 parent 987c8d0 commit a2c357a

File tree

1 file changed

+5
-9
lines changed

1 file changed

+5
-9
lines changed

README.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -89,13 +89,9 @@ At a functional level, an SEH overwrite is achieved using a stack-based buffer o
8989

9090
Security measures in code and operating system protection are not enough. When an organization discovers a buffer overflow vulnerability, it must react quickly to patch the affected software and make sure that users of the software can access the patch.
9191

92-
## Links
92+
## Resources
9393

94-
https://stackoverflow.com/questions/38416792/array-allows-out-of-bounds-access-in-c
95-
https://www.codeproject.com/Questions/1075908/what-you-do-to-avoid-out-of-bounds-array-access-in
96-
https://www.imperva.com/learn/application-security/buffer-overflow/
97-
https://www.geeksforgeeks.org/buffer-overflow-attack-with-example/
98-
99-
## Ideas
100-
101-
- Tex file of research
94+
- [Stack Overflow question about Buffer Overflow](https://stackoverflow.com/questions/38416792/array-allows-out-of-bounds-access-in-c)
95+
- [Avoid out of bounds array article](https://www.codeproject.com/Questions/1075908/what-you-do-to-avoid-out-of-bounds-array-access-in)
96+
- [Imperva article about Buffer Overflow](https://www.imperva.com/learn/application-security/buffer-overflow/)
97+
- [GeeksForGeeks](https://www.geeksforgeeks.org/buffer-overflow-attack-with-example/)

0 commit comments

Comments
 (0)