What is an Integer Overflow Vulnerability? | Hacking 101

preview_player
Показать описание
A quick introduction to how binary integers work, what an integer overflow is, and how they can lead to software vulnerabilities.
Рекомендации по теме
Комментарии
Автор

Marcus' voice is so soothing. 10/10 would take a yoga class with him.

monicapardeshi
Автор

Great video as always. I just want to note for those that may be new watching that 4, 294, 967, 295 is the maximum for *unsigned* ints(2^32 - 1), but not *signed* ints(2^31 - 1). You'll notice the use of the unsigned keyword in the parameters that are passed. I thought it was also useful to mention that in the beginning we are treating that as an unsigned 8-bit number, so when you say the lowest value for an int is 0, you mean for unsigned ints; regular ints would not overflow to zero but rather INT_MIN.

Also, yes, I know Marcus knows this and was just making a nice beginner-friendly tutorial. I'm just stopping by to help out the curious beginner. There's lots more fun and oddities with ints as you progress :p

WhatTheWeb
Автор

The most crystal clear explanation of overflows I've ever seen. Thanks Marcus, epic stuff.!

RobertWallhead
Автор

Probably the BEST explanation at an atomic level of an integer overflow I have ever seen. Great job Bro.

matthewlandry
Автор

You're the man, Marcus. I was searching for several integer overflow explanations and when I came across this one I stopped to make some popcorn.

ikehilyard
Автор

I like how you give us an intuitive real world example with the stock market, but also show us a technical example with the code. Awesome video!

Treegrower
Автор

I'd love to see a video in the future of how this heap overflow can be exploited. This was a great video!

Firefoxgaming
Автор

Very good video, straight to the point. Many thanks for sharing!

dxwoo
Автор

Thanks for the explanation
Really helpful

uchennagodfrey
Автор

Omg I understand! I've never understood this before! Thank you! 😭❤️

catboy_official
Автор

You got to just before the point where you explain the hacking part. lol What a tease!

deemon
Автор

Great explanation! The lack of memory deallocation made me twitch a bit, but that is my issue. :)

RandyFortier
Автор

please do more short informative videos like this.

banana-
Автор

Do creating a buffer overflow in an array next!

internetwarrior
Автор

Best cyber security content on YouTube hands down. If you disagree I must not know the channel you speak of so drop below 👇

itsme
Автор

Really good pratical example at the end. By the way do u still stream on twitch lol

cipherbenchmarks
Автор

Interesting that it interprets the 4billion to set the sign bit in the signed int. Anyways nice video, thx!

NvrSwm
Автор

Very similar to the date over flow in 1999 to 2000 otherwise known as Y2K programmer problem.

DonMayfield
Автор

please make a video on how DLL injections work

parthgol
Автор

Can you reverse a real virus like wannacry, Step by step, . or doing a program with have vulnerability like buffer overflow and install to other pc then exploit it over the network ,

kalopseeia