Running a Buffer Overflow Attack - Computerphile

2,053,790
0
Published 2016-03-02
Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike Pound details how it's done.

Formerly titled "Buffer Overflow Attack" -Aug 2021

The Stack:    • Reverse Polish Notation and The Stack...  
Botnets:    • Botnets - Computerphile  
The Golden Key: iPhone Encryption:    • The Golden Key: FBI vs Apple iPhone -...  
3D Stereo Vision:    • Stereo 3D Vision (How to avoid being ...  
Brain Scanner:    • Brain Scanner - Computerphile  

www.facebook.com/computerphile
twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com/

All Comments (21)
  • This was by far the best video..... Normally Computerphile tries to address a wider audience, but I personally would like to see more of these kind of in-depth videos.
  • @ItsNotJustRice
    I know this particular video was years ago, but this guy is actually fun to watch. I'm terrible at learning, but he makes sense of a lot of things without dragging on the boring part.
  • I'm a cs major, but I don't normally like watching cs related youtube channels. These videos are awesome though, some of them are things I thought I had a decent grasp on and I end up learning something. I also love how happy Dr. Pound seems when he is talking about something, you can tell he really likes what he does.
  • @edgeeffect
    The sledge/bomb animation is BRILLIANT!
  • @ButzPunk
    This was brilliant. More like it, please!
  • @ElagabalusRex
    I would love to see a series on micro-architectures, machine code, and assembly
  • @TheMagAirsoft
    Dr Mike Pound, i do not know if you know this but you are saving a lot of network security students with your videos on these subjects. They are incredibly informative and makes a whole subject comprehensible in the matter of minutes. A Great thank you.
  • I watched this a long time ago, but after taking an Assembly class in uni, I suddenly completely understand what he did and why it works! this is an absolutely amazing video as it actually gives an incentive to continue learning low-level programming and such.
  • for years ive been reading and trying to work out the ins and outs of bufferoverflow i can honestly say this is one of the most simple and effective videos out there on BO well done and Kudos loved watching it (for the 100th time)
  • @shumakriss
    Thank you! I've never seen this explained in its entirety and there are lots nuances that have always inhibited my own educational endeavors. Knowing GDB, assembler, endianness, no-op sleds, etc were all concepts I understood but could never completely tie together. Excellent video.
  • @Elite7555
    Absolutely brilliant demonstration. All universities that I know teach C/C++, but they don't teach the essence of software security, which should be pounded into every student's head right from the beginning.
  • @qgysugfq3935
    This hits especially hard since I just finished my assembly and computer systems class. Great video!
  • @jonahansen
    Damn! Excellent presentation on how stack overflow exploits work! No hand-waving; a complete demonstration of how it's done, down to aligning the return address and the no-op sled mitigation.
  • @JaceLansing
    Man! How am I only finding your channel now!? This was great. Thank you for taking the time to put this together.
  • @realeques
    i love how he explains every topic like its the best in the world... i could use him as my personal coach !
  • @MrJoao6697
    What a video! Great job on explaining this attack, I'll definitely be looking forward to learn more of this as I get into assembler at University!
  • @timm9301
    I have studied exploit dev for a number of years and this is by far one of the best explanations ever! Keep it up!