Fixing Exploits

Fixing Memory Corruption Exploits

Overview and Considerations

Importing and Examining the Exploit

Cross-Compiling Exploit Code

Changing the Socket Information

Changing the Return Address

Changing the Payload

Changing the Overflow Buffer

Fixing Web Exploits

Web Application Attacks

Considerations and Overview

Selecting the Vulnerability

Changing Connectivity Information

Troubleshooting the "index out of range" Error


Relevant Note(s): Exploitation Locating Public Exploits