Other Application Attacks - SY0-601 CompTIA Security+ : 1.3

preview_player
Показать описание
- - - - -
There are many options available for the knowledgeable attacker. In this video, you’ll learn about memory vulnerabilities, directory traversal, improper error handling, API attacks, and resource exhaustion.
- - - - -

FOLLOW PROFESSOR MESSER:
Рекомендации по теме
Комментарии
Автор

The ZIP bomb part had me dying laughing. 42kb to 4500TB 😭😭😭😭😭

Jeffway
Автор

As a software developer, I feel attacked 🤣 In all seriousness, this is why null checks are done, when I first started developing I didn't really see the point, other than a fail safe, but this is really interesting. Great stuff as always!

rickraydubs
Автор

What's the difference between a memory leak and buffer overflow?

k-dj
Автор

Professor Messer!! I just got out of the military and I have a TS/SCI, I'm going to be taking sy0-601 super early January. Any tips or recommendations for me? Also Wondering if you know anybody who I could talk to to lead me in the right direction. Thank you and have a great day!

alexsmith
Автор

i just think about pokemon speedrunning and how expertly they can manipulate mem stack overflows

masterofchess
Автор

Fun fact, Donkey Kong 64 had to have the memory expansion slot to run because of a memory leak.
They used marketing to say it's because it was such a big game. Nope, actually an intern had made a typo that caused a memory leak. They expanded the memory so the leak wouldnt happen on an average playtime (50-ish hours vs 7 hours).

People emulating the game have found that it will crash their emulator if they only use save states. 😂😂

curlybob
Автор

Is Memory leak a form of resource exhaustion?

Hez