Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

Published 2022-02-04
Exploits represent any piece of code, data or sequence of commands that targets a vulnerable application for the purpose of gaining unauthorized access. Log4j is one of the most popular recent exploits that is widely considered to be the most dangerous exploit of our time.

In this video, we will break down the anatomy of an exploit, and how each part of the malicious code comes together to target a vulnerable application. We’ll discuss the three distinct parts most exploits have in common, as well as a deep dive into Log4j.

Exploit Anatomy 0:51
Lof4j Overview 1:12
Types of Exploits 2:25
Buffer Overflows 2:44
Buffer Overflow Demo 3:18
Shell Codes 4:07
Jumping the Memory Stack 5:26
Payloads 5:49
Meterpreter 6:30
Layered Defense Against Exploits 7:05

All Comments (12)