How They Hack: Simple Buffer Overflow

Поділитися
Вставка
  • Опубліковано 22 лис 2024

КОМЕНТАРІ • 26

  • @tazotye
    @tazotye 11 місяців тому +9

    watching this in 2024 almost ,thank u

    • @nm_9_
      @nm_9_ 7 місяців тому

      same

  • @JamesLyne
    @JamesLyne  9 років тому +5

    Hey everyone, this is one of a series of 7 videos that cover basic buffer overflow concepts. They were used for me to answer a specific question I was asked but thought they might be more generally helpful. This is a very rudimentary example compared to what happens today, but it is a good place to start.

  • @tryingtocorrect
    @tryingtocorrect 2 роки тому

    Excellent explanation. So easy to understand, and now can think more complicated situations what hacker could do.

  • @alicandonmez6748
    @alicandonmez6748 8 років тому +4

    Nice explanation, more videos on other type of attacks please :)

  • @mohamedwaellabidi1850
    @mohamedwaellabidi1850 14 днів тому

    Clear explanation

  • @djwswsqdcdsacsd
    @djwswsqdcdsacsd 5 місяців тому

    That's why gets() function was replaced with fgets() because gets doesn't care about the limits of what the array can store

  • @praveshshukla3940
    @praveshshukla3940 7 років тому +1

    this is very helpfull and interesting, but what if the user running program in as non-root user, then their this won't be possible.
    and the next things please explain-- how if non-root user saw segmentation fault (core dumped), then how to see the detail as where the core is dumped .

  • @feo130
    @feo130 8 років тому +1

    Awesome explanation, thank you!

  • @rameshpandita1922
    @rameshpandita1922 3 роки тому

    This was explained perfectly thank you so much 💓

  • @nikhilfinework354
    @nikhilfinework354 3 роки тому

    You are very underated

  • @narimanmortezaei5888
    @narimanmortezaei5888 4 роки тому +1

    char array is defined first and then the passcheck variable. shouldnt it define the array first and and then the passcheck in stack (from lower memory addresses to higher we have passcheck and then array)? or am i missing something ?

    • @unboxer2487
      @unboxer2487 4 роки тому +1

      That is actually what I am thinking as well. Have u figured it out why it is so?

  • @darshank3012
    @darshank3012 9 років тому +1

    excellent... thank you

  • @dilrajdhillon9231
    @dilrajdhillon9231 5 років тому +1

    sir, what would have happened if we would have put if(passcheck==1) instead of if(passcheck)

  • @omarAhmed-wt8kx
    @omarAhmed-wt8kx 7 років тому +1

    good representation

  • @ancestrall794
    @ancestrall794 2 роки тому

    Thanks a lot

  • @3hustle
    @3hustle 11 місяців тому

    💻 The video explains the concept of buffer overflow in computer security using a simple C program as an example.
    00:14
    Buffer overflow is a common security vulnerability that allows attackers to execute unauthorized functionality.
    00:14
    The video demonstrates a simple C program with a vulnerable gets function and a storage area for characters.
    01:02
    The gets function captures user input and can lead to potential security exploits.
    01:45
    The concept of buffer overflow extends to modern code and is still a relevant security concern.
    02:26
    ⚠ The video discusses the potential security risk of buffer overflow in a program and its implications.
    02:59
    Buffer overflow can occur when too much information is provided, leading to overwriting of nearby memory.
    02:59
    The program functionality allows access to sensitive files if the correct password is guessed.
    04:33
    The lack of stack protection in the program makes it vulnerable to exploitation.
    05:08
    💻 The video discusses the impact of buffer overflow and the importance of bounds checking in preventing security vulnerabilities in software development.
    05:20
    Buffer overflow can make things simpler for attackers, like in the old days.
    05:20
    A longer input string can lead to overwriting memory and executing unintended functionality.
    05:46
    Failing to do bounds checking can be extremely beneficial to attackers.
    07:00
    Developers should pay attention to bounds checking and avoid older, less secure functions.

  • @praveshshukla3940
    @praveshshukla3940 7 років тому +1

    And sir can you please give the detail about what these means, atleast at an abstract level would be fine:
    root:!:17156:0:99999:7:::
    daemon:*:17001:0:99999:7:::
    bin:*:17001:0:99999:7:::
    sys:*:17001:0:99999:7:::
    etc,etc

  • @tsunningwah3471
    @tsunningwah3471 9 місяців тому

    bbbbbbbbb s