Running a Buffer Overflow Attack - Computerphile

2,031,709
0
Published 2016-03-02
Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike Pound details how it's done.

Formerly titled "Buffer Overflow Attack" -Aug 2021

The Stack:    • Reverse Polish Notation and The Stack...  
Botnets:    • Botnets - Computerphile  
The Golden Key: iPhone Encryption:    • The Golden Key: FBI vs Apple iPhone -...  
3D Stereo Vision:    • Stereo 3D Vision (How to avoid being ...  
Brain Scanner:    • Brain Scanner - Computerphile  

www.facebook.com/computerphile
twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com/

All Comments (21)
  • This was by far the best video.....
    Normally Computerphile tries to address a wider audience, but I personally would like to see more of these kind of in-depth videos.
  • @ElagabalusRex
    I would love to see a series on micro-architectures, machine code, and assembly
  • @edgeeffect
    The sledge/bomb animation is BRILLIANT!
  • @ItsNotJustRice
    I know this particular video was years ago, but this guy is actually fun to watch. I'm terrible at learning, but he makes sense of a lot of things without dragging on the boring part.
  • @sickerpuppies
    "It's meant for ethical hacking, let's just make that clear" - Mike Pound, 2016
  • @sivalley
    To err is human, but to really foul things up requires the root password.
    -Unknown
  • I'm a cs major, but I don't normally like watching cs related youtube channels. These videos are awesome though, some of them are things I thought I had a decent grasp on and I end up learning something. I also love how happy Dr. Pound seems when he is talking about something, you can tell he really likes what he does.
  • @Elite7555
    Absolutely brilliant demonstration. All universities that I know teach C/C++, but they don't teach the essence of software security, which should be pounded into every student's head right from the beginning.
  • @geonerd
    Mike has a certain Dr. Evil vibe in that he clearly enjoys writing "Malicious Code." :)
  • @ButzPunk
    This was brilliant. More like it, please!
  • @Anvilshock
    Nice presentation, thanks! It would be even nicer to have the stack video segment made clickable, given YouTube's tendency to "Suggest" everything but related videos.
  • @realeques
    i love how he explains every topic like its the best in the world... i could use him as my personal coach !
  • @JaceLansing
    Man! How am I only finding your channel now!? This was great. Thank you for taking the time to put this together.
  • @qgysugfq3935
    This hits especially hard since I just finished my assembly and computer systems class. Great video!
  • @DFX2KX
    messing with, and forcibly messing with the stack is the source of a few old school console hacks if I recall, particularly on NES games. You write memory by doing very specific things to set certain memory values in an unusual way
  • @timm9301
    I have studied exploit dev for a number of years and this is by far one of the best explanations ever! Keep it up!
  • @shumakriss
    Thank you! I've never seen this explained in its entirety and there are lots nuances that have always inhibited my own educational endeavors. Knowing GDB, assembler, endianness, no-op sleds, etc were all concepts I understood but could never completely tie together. Excellent video.