Running a Buffer Overflow Attack - Computerphile

2,036,377
0
Publicado 2016-03-02
Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike Pound details how it's done.

Formerly titled "Buffer Overflow Attack" -Aug 2021

The Stack:    • Reverse Polish Notation and The Stack...  
Botnets:    • Botnets - Computerphile  
The Golden Key: iPhone Encryption:    • The Golden Key: FBI vs Apple iPhone -...  
3D Stereo Vision:    • Stereo 3D Vision (How to avoid being ...  
Brain Scanner:    • Brain Scanner - Computerphile  

www.facebook.com/computerphile
twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com/

Todos los comentarios (21)
  • This was by far the best video..... Normally Computerphile tries to address a wider audience, but I personally would like to see more of these kind of in-depth videos.
  • @ElagabalusRex
    I would love to see a series on micro-architectures, machine code, and assembly
  • @edgeeffect
    The sledge/bomb animation is BRILLIANT!
  • @sickerpuppies
    "It's meant for ethical hacking, let's just make that clear" - Mike Pound, 2016
  • @ItsNotJustRice
    I know this particular video was years ago, but this guy is actually fun to watch. I'm terrible at learning, but he makes sense of a lot of things without dragging on the boring part.
  • @sivalley
    To err is human, but to really foul things up requires the root password. -Unknown
  • @Elite7555
    Absolutely brilliant demonstration. All universities that I know teach C/C++, but they don't teach the essence of software security, which should be pounded into every student's head right from the beginning.
  • @ButzPunk
    This was brilliant. More like it, please!
  • @colossalbreacker
    I'm a cs major, but I don't normally like watching cs related youtube channels. These videos are awesome though, some of them are things I thought I had a decent grasp on and I end up learning something. I also love how happy Dr. Pound seems when he is talking about something, you can tell he really likes what he does.
  • @JaceLansing
    Man! How am I only finding your channel now!? This was great. Thank you for taking the time to put this together.
  • @DFX2KX
    messing with, and forcibly messing with the stack is the source of a few old school console hacks if I recall, particularly on NES games. You write memory by doing very specific things to set certain memory values in an unusual way
  • @__-xl1zi
    Everyone else: makes a 20 char buffer Mike: "We allocate a buffer that's 500 characters long"
  • @shumakriss
    Thank you! I've never seen this explained in its entirety and there are lots nuances that have always inhibited my own educational endeavors. Knowing GDB, assembler, endianness, no-op sleds, etc were all concepts I understood but could never completely tie together. Excellent video.
  • @jonahansen
    Damn! Excellent presentation on how stack overflow exploits work! No hand-waving; a complete demonstration of how it's done, down to aligning the return address and the no-op sled mitigation.
  • @Anvilshock
    Nice presentation, thanks! It would be even nicer to have the stack video segment made clickable, given YouTube's tendency to "Suggest" everything but related videos.
  • @MrJoao6697
    What a video! Great job on explaining this attack, I'll definitely be looking forward to learn more of this as I get into assembler at University!
  • @timm9301
    I have studied exploit dev for a number of years and this is by far one of the best explanations ever! Keep it up!