how do hackers exploit buffers that are too small?
Low Level Learning Low Level Learning
683K subscribers
196,999 views
10K

 Published On Nov 26, 2022

Keep on learning with Brilliant at https://brilliant.org/LowLevelLearning. Get started for free, and hurry — the first 200 people get 20% off an annual premium subscription with my URL! Thanks again Brilliant for sponsoring this video!

The best to write code that is safe is to first break code that is not safe. Today, we'll be taking the code that I wrote for my strings cybersecurity video, and breaking it. By breaking this code, I hope you all get a better understand of how dangerous string functions can lead to a hacker taking over your code and getting control of your system.

HACK MY CODE: https://github.com/lowlevellearning/s...
Written Tutorial:   / your-first-buffer-overflow  

🏫 COURSES 🏫
https://www.udemy.com/course/c-progra...

🔥🔥🔥 SOCIALS 🔥🔥🔥
Low Level Merch!: https://www.linktr.ee/lowlevellearning
Follow me on Twitter:   / lowleveltweets  
Follow me on Twitch:   / lowlevellearning  
Join me on Discord!:   / discord  

show more

Share/Embed