How They Hack: Simple Buffer Overflow

  Рет қаралды 38,519

James Lyne

James Lyne

9 жыл бұрын

I bashed this video together to show you the loose concept of a buffer overflow and how abusing inputs can enable an attacker to execute code or change the behaviour of a program in a noteworthy way. This example is very simple compared to more modern examples which are covered in my other videos.

Пікірлер: 24
@JamesLyne
@JamesLyne 9 жыл бұрын
Hey everyone, this is one of a series of 7 videos that cover basic buffer overflow concepts. They were used for me to answer a specific question I was asked but thought they might be more generally helpful. This is a very rudimentary example compared to what happens today, but it is a good place to start.
@alicandonmez6748
@alicandonmez6748 7 жыл бұрын
Nice explanation, more videos on other type of attacks please :)
@tryingtocorrect
@tryingtocorrect 2 жыл бұрын
Excellent explanation. So easy to understand, and now can think more complicated situations what hacker could do.
@feo130
@feo130 7 жыл бұрын
Awesome explanation, thank you!
@rameshpandita1922
@rameshpandita1922 3 жыл бұрын
This was explained perfectly thank you so much 💓
@praveshshukla3940
@praveshshukla3940 7 жыл бұрын
this is very helpfull and interesting, but what if the user running program in as non-root user, then their this won't be possible. and the next things please explain-- how if non-root user saw segmentation fault (core dumped), then how to see the detail as where the core is dumped .
@narimanmortezaei5888
@narimanmortezaei5888 4 жыл бұрын
char array is defined first and then the passcheck variable. shouldnt it define the array first and and then the passcheck in stack (from lower memory addresses to higher we have passcheck and then array)? or am i missing something ?
@unboxer2487
@unboxer2487 3 жыл бұрын
That is actually what I am thinking as well. Have u figured it out why it is so?
@darshank3012
@darshank3012 8 жыл бұрын
excellent... thank you
@nikhilfinework354
@nikhilfinework354 3 жыл бұрын
You are very underated
@mamakfm7b929
@mamakfm7b929 5 ай бұрын
watching this in 2024 almost ,thank u
@nm_9_
@nm_9_ Ай бұрын
same
@dilrajdhillon9231
@dilrajdhillon9231 4 жыл бұрын
sir, what would have happened if we would have put if(passcheck==1) instead of if(passcheck)
@unboxer2487
@unboxer2487 3 жыл бұрын
Just try it.
@thenextbigthing1393
@thenextbigthing1393 10 ай бұрын
Then it would just show "you fail" I guess.
@neunzehnvierundachtzig
@neunzehnvierundachtzig 4 ай бұрын
Fail cause anything other than 0 is true. but you're doing specific Boolean comparison here.
@omarAhmed-wt8kx
@omarAhmed-wt8kx 6 жыл бұрын
good representation
@ancestrall794
@ancestrall794 2 жыл бұрын
Thanks a lot
@praveshshukla3940
@praveshshukla3940 7 жыл бұрын
And sir can you please give the detail about what these means, atleast at an abstract level would be fine: root:!:17156:0:99999:7::: daemon:*:17001:0:99999:7::: bin:*:17001:0:99999:7::: sys:*:17001:0:99999:7::: etc,etc
@tsunningwah3471
@tsunningwah3471 3 ай бұрын
bbbbbbbbb s
@3hustle
@3hustle 5 ай бұрын
💻 The video explains the concept of buffer overflow in computer security using a simple C program as an example. 00:14 Buffer overflow is a common security vulnerability that allows attackers to execute unauthorized functionality. 00:14 The video demonstrates a simple C program with a vulnerable gets function and a storage area for characters. 01:02 The gets function captures user input and can lead to potential security exploits. 01:45 The concept of buffer overflow extends to modern code and is still a relevant security concern. 02:26 ⚠ The video discusses the potential security risk of buffer overflow in a program and its implications. 02:59 Buffer overflow can occur when too much information is provided, leading to overwriting of nearby memory. 02:59 The program functionality allows access to sensitive files if the correct password is guessed. 04:33 The lack of stack protection in the program makes it vulnerable to exploitation. 05:08 💻 The video discusses the impact of buffer overflow and the importance of bounds checking in preventing security vulnerabilities in software development. 05:20 Buffer overflow can make things simpler for attackers, like in the old days. 05:20 A longer input string can lead to overwriting memory and executing unintended functionality. 05:46 Failing to do bounds checking can be extremely beneficial to attackers. 07:00 Developers should pay attention to bounds checking and avoid older, less secure functions.
How They Hack: Buffer Overflow & GDB Analysis - James Lyne
16:06
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
Omega Boy Past 3 #funny #viral #comedy
00:22
CRAZY GREAPA
Рет қаралды 33 МЛН
КАХА и Джин 2
00:36
К-Media
Рет қаралды 4,1 МЛН
格斗裁判暴力执法!#fighting #shorts
00:15
武林之巅
Рет қаралды 91 МЛН
WHY IS A CAR MORE EXPENSIVE THAN A GIRL?
00:37
Levsob
Рет қаралды 12 МЛН
Buffer Overflow Hacking Tutorial (Bypass Passwords)
55:39
David Bombal
Рет қаралды 68 М.
W8 L3 Buffer Overflow Attacks
28:10
Introduction to Operating Systems
Рет қаралды 23 М.
how do hackers exploit buffers that are too small?
8:25
Low Level Learning
Рет қаралды 185 М.
Strings can get you hacked! (buffer overflows, strcpy, and gets)
9:04
why do header files even exist?
10:53
Low Level Learning
Рет қаралды 351 М.
How to exploit a buffer overflow vulnerability - Practical
9:44
Daniel Slater
Рет қаралды 267 М.
Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work
9:08
The CISO Perspective
Рет қаралды 13 М.
Hacker Techniques  Introduction to Buffer Overflows
51:56
Off By One Security
Рет қаралды 10 М.
C Buffer Overflow, Heap/Stack Corruption and Analysis
5:17
Engineer Man
Рет қаралды 51 М.
cool watercooled mobile phone radiator #tech #cooler #ytfeed
0:14
Stark Edition
Рет қаралды 7 МЛН
Apple, как вас уделал Тюменский бренд CaseGuru? Конец удивил #caseguru #кейсгуру #наушники
0:54
CaseGuru / Наушники / Пылесосы / Смарт-часы /
Рет қаралды 4,5 МЛН