W1_8d : Demonstration of Shell Creation using a Buffer Overflow on the Stack

  Рет қаралды 6,066

NPTEL-NOC IITM

NPTEL-NOC IITM

Күн бұрын

"This video is part of the NPTEL course Information Security module 5 and covers topics on Secure Systems Engineering.
The Virtual Machine used in the demo videos can be found here:
drive.google.c....
The slides and other associated materials can be accessed here:
bitbucket.org/...."
To access the translated content:
1. The translated content of this course is available in regional languages. For details please visit nptel.ac.in/tr...
The video course content can be accessed in the form of regional language text transcripts, books which can be accessed under downloads of each course, subtitles in the video and Video Text Track below the video.
Your feedback is highly appreciated. Kindly fill this form forms.gle/XFZh...
2. Regional language subtitles available for this course
To watch the subtitles in regional languages:
1. Click on the lecture under Course Details.
2. Play the video.
3. Now click on the Settings icon and a list of features will display
4. From that select the option Subtitles/CC.
5. Now select the Language from the available languages to read the subtitle in the regional language.

Пікірлер: 2
W2_1 - Preventing buffer overflows with canaries and W^X
19:01
NPTEL-NOC IITM
Рет қаралды 6 М.
First Exploit! Buffer Overflow with Shellcode - bin 0x0E
12:23
LiveOverflow
Рет қаралды 273 М.
Миллионер | 2 - серия
16:04
Million Show
Рет қаралды 1,2 МЛН
Kubernetes crash course: In less than 15 minutes
14:26
IT k Funde
Рет қаралды 117 М.
Buffer Overflow Hacking Tutorial (Bypass Passwords)
55:39
David Bombal
Рет қаралды 75 М.
Fault Simulation (Part 1)
28:48
VLSI Physical Design
Рет қаралды 37 М.
W2_2 - Return-to-libc attack
13:32
NPTEL-NOC IITM
Рет қаралды 22 М.
how do hackers exploit buffers that are too small?
8:25
Low Level
Рет қаралды 199 М.
SSH Keys
10:12
RobEdwards
Рет қаралды 117 М.
before you code, learn how computers work
7:05
Low Level
Рет қаралды 425 М.
W8 L3 Buffer Overflow Attacks
28:10
Introduction to Operating Systems
Рет қаралды 25 М.
What is MapReduce?
5:37
internet-class
Рет қаралды 245 М.