What Happens in a Buffer Overflow Attack - [via Computerphile]
Buffer overflows are a type of reverse engineering attacks in which one manipulates the instructions in an application for potentially malicious purposes.
There can be more types of buffer overflow but two common are remote and local. Let's take for example local buffer overflow?
What's the purpose of it? Well, if you are on a system as a low privilege user and the system runs an application that is vulnerable to buffer overflow, you could exploit the buffer overflow and escalate your privileges on the system; by, for example, throwing a root shell.
In this video, folks at Computerphile, thoroughly and graphically explain what happens in a buffer overflow attack. Assistant Professor Dr. Mike Pound also demonstrate who instructions are executed in a program using gdb, a command line debugger in linux.
Personally, at one point, I am really interested in getting into and learning reverse engineering as I find it really important in cybersecurity (a field that I'm training myself for), especially when it comes to malware analysis. For now, I'm training on vulnerable virtual machines to obtain a shell and escalate my privileges to root.
Anyway, if you're a geek and you want to understand buffer overflow attacks, this 20 minute long video is a very good start!
To stay in touch with me, follow @cristi
Cristi Vlad Self-Experimenter and Author
To listen to the audio version of this article click on the play image.
Brought to you by @tts. If you find it useful please consider upvote this reply.
Butter over bread? I don't get it!
I love these Computerphile Videos.
Are you planning to visualize buffer overflows using an example?
what do you mean to visualize?
Using an example with screenshots :)