Blog | G5 Cyber Security

EXE Audit: Buffer Overflow Protections

TL;DR

This guide shows you how to check if your Windows executable (.exe) files have important security features enabled to help prevent buffer overflow attacks. We’ll use tools built into Windows and some freely available utilities.

Checking EXE Protections

  1. Understand the Protections
  • Using Dependency Walker (depends.exe)
  • Dependency Walker is an older tool but still useful for basic checks.

  • Using the `dumpbin` command-line tool
  • dumpbin is part of Visual Studio and provides detailed information about executables.

  • Using PEView (for more detailed analysis)
  • PEView provides a graphical interface for examining the Portable Executable (PE) file format.

  • Checking SEHOP Status (using `editbin`)
  • SEHOP status can be checked with the editbin tool.

  • Important Considerations
  • Exit mobile version