From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Overflowing the buffer
From the course: Ethical Hacking: System Hacking
Overflowing the buffer
- [Instructor] Buffers are designed to hold a finite amount of data, but when overloaded, the excess can overflow and overwrite adjacent buffers. In this segment, we'll learn how a buffer overflow works and outline the two types of buffer overflow attacks. First, let's talk about the concept of a buffer. In programming, a buffer is a temporary storage area in memory used to hold data while it's being transferred from one place to another. In most cases, buffers are created to contain a finite amount of data. A buffer overflow is a software vulnerability that occurs when a process or program places too much data into a buffer or memory location designated for temporary storage. If excess data is sent to a buffer, it can overflow and overwrite adjacent memory areas. Malicious actors love to use buffer overflow vulnerabilities and exploit them as much as possible, as this can lead to the ability to infiltrate the network and allow unauthorized access to critical information. Buffer…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.