Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work
13,135
Published 2022-02-04
In this video, we will break down the anatomy of an exploit, and how each part of the malicious code comes together to target a vulnerable application. We’ll discuss the three distinct parts most exploits have in common, as well as a deep dive into Log4j.
Exploit Anatomy 0:51
Lof4j Overview 1:12
Types of Exploits 2:25
Buffer Overflows 2:44
Buffer Overflow Demo 3:18
Shell Codes 4:07
Jumping the Memory Stack 5:26
Payloads 5:49
Meterpreter 6:30
Layered Defense Against Exploits 7:05
All Comments (12)
-
this channel is amazing, and your explanations are incredibly clear and comprehensible
-
No regrets in subscribing this Channel. Thank you so much for sharing the knowledge.
-
best cybersecurity channel in youtube for sure! love the pictures and the way you explain things. Please keep it up!
-
Great video!
-
can you do like...more videos, this is one of the best resources I use for modern security practices
-
thanks, what software did you use to make the animated illustrations in the video?
-
Great explanation. Great channel.
-
Welcome back :)
-
You are awesome!
-
14'th
-
Letsgoo🤘🏼. Size 10 @_raff_raff