The Basics of Buffer Overflows
Buffer overflow attacks can often be avoided with proper system configurations. In this video, you will learn about buffers and how a buffer can be exploited in a buffer overflow attack. Pay attention to the seriousness of a buffer overflow attack and the possible outcome of this type of attack. What affect can the attack have on a system? How would a buffer overflow attack be initiated against a system? What procedures should be in place to avoid a buffer overflow attack? What programming languages are vulnerable to buffer overflow attacks?
Source: National Consortium for Mission Critical Operations, https://www.youtube.com/watch?v=SOoJcrR4Ijo
This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Friday, July 26, 2024, 12:25 PM