Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

preview_player
Показать описание
Exploits represent any piece of code, data or sequence of commands that targets a vulnerable application for the purpose of gaining unauthorized access. Log4j is one of the most popular recent exploits that is widely considered to be the most dangerous exploit of our time.

In this video, we will break down the anatomy of an exploit, and how each part of the malicious code comes together to target a vulnerable application. We’ll discuss the three distinct parts most exploits have in common, as well as a deep dive into Log4j.

Exploit Anatomy 0:51
Lof4j Overview 1:12
Types of Exploits 2:25
Buffer Overflows 2:44
Buffer Overflow Demo 3:18
Shell Codes 4:07
Jumping the Memory Stack 5:26
Payloads 5:49
Meterpreter 6:30
Layered Defense Against Exploits 7:05
Рекомендации по теме
Комментарии
Автор

this channel is amazing, and your explanations are incredibly clear and comprehensible

igorCODever
Автор

best cybersecurity channel in youtube for sure! love the pictures and the way you explain things. Please keep it up!

nghibui
Автор

No regrets in subscribing this Channel.
Thank you so much for sharing the knowledge.

ruggedlook
Автор

can you do like...more videos, this is one of the best resources I use for modern security practices

CrazyCanuck
Автор

thanks, what software did you use to make the animated illustrations in the video?

MacSuperior_