⚠️* Disclaimer:
The information presented in this video is for educational purposes only. It is not intended to be used for illegal or malicious activities. The creator and any individuals involved in the production of this video are not responsible for any misuse of the information provided. It is the responsibility of the viewer to ensure that they comply with all relevant laws and regulations in their jurisdiction.
I really hope you enjoyed this video! Comment "0x41414141" if you read this!
🔖 My Socials:
avatar/mascot made with picrew: [ Ссылка ]
- full credits to the artist: [ Ссылка ]
- visit her shop: [ Ссылка ]
official discord server: [ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]_
💖 Support My Work
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
Join this channel to get access to perks:
[ Ссылка ]
🖥️ Extra Resources:
[ Ссылка ]
[ Ссылка ]
📹 Videos/Channels Mentioned:
TCM's BOF Playlist:
[ Ссылка ]
LiveOverFlow's Python2 vs Python3:
[ Ссылка ]
🎵 Music Credit goes to Ian Taylor, and Adam Bond (a variety of OSRS OSTs): Created using intellectual property belonging to Jagex Limited under the terms of Jagex's Fan Content Policy. This content is not endorsed by or affiliated with Jagex.
The images and music used in this video are used under the principle of fair use for the purpose of criticism, comment, news reporting, teaching, scholarship, and research. I do not claim ownership of any of the images/music and they are used solely for the purpose of enhancing the content of the video. I respect the rights of the creators and owners of these images and will remove any image upon request by the rightful owner.
Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.
🕰️ Timestamps:
00:00 - Intro
00:31 - Background
02:25 - What is a Buffer Overflow?
05:06 - Secure Example
07:21 - Insecure Example
07:52 - Prerequisites
09:03 - Exploitation Checklist
10:16 - Assembly Basics
11:56 - Common Pitfalls
12:43 - Getting Our Hands Dirty
19:07 - Exploiting The Binary
20:37 - Bonus
21:05 - Challenge
29:50 - Outro
Buffer Overflows: A Symphony of Exploitation
Теги
Buffer OverflowsExploitsBOFsHackingHackerPenetration TestingPentestingOSCPCyber SecurityInformation SecurityComputer SecurityComputer ScienceCompSCIeCPPTOffensive SecurityeLearnSecurityeLSAssemblyReverse EngineeringProgrammingDocumentaryLiveOverFlowHow ToTutorialLogPenetration TesterThe Cyber MentorTCMComputersLinuxKaliNetwork SecurityVulnerabilityVirusHackCyber AttackAttackMalwareData BreachCybersecurity TipsNewcrowCrowlog