Загрузка...

Buffer Overflow Demo — GCC & GDB on Linux (Unsafe fgets() Explained)

This video demonstrates a classic buffer overflow using a simple C program and shows how unsafe functions like gets() can be exploited to overwrite the stack and alter program flow. We compile with -g -O0 -fno-stack-protector --no-pie to disable protections and debug easily with gdb.

This content is for educational & defensive purposes only. Never test on systems or networks you don't own or have explicit permission to test.

Files / commands shown
sudo apt update
sudo apt install -y build-essential
nano overflow.c # paste the C program
gcc -g -O0 -fno-stack-protector --no-pie overflow.c -o overflow
./overflow
# use gdb to inspect: gdb ./overflow.

⏱ Suggested Timeline (edit times to match your video)

00:00 - Open VMware & Launch Kali Linux
00:17 - Open terminal
00:27 - sudo update & install
00:37 - create file & write code
01:55 - Run GCC buffer overflow cmd
02:05 - Test with Wrong & Correct password

⚠️ Disclaimer
Disclaimer: This video is intended for educational and defensive learning only. Do NOT exploit vulnerabilities on systems you do not own or have explicit, written permission to test. Misuse of these techniques may be illegal and unethical. Always follow local laws and organizational policies.

Видео Buffer Overflow Demo — GCC & GDB on Linux (Unsafe fgets() Explained) канала NetExposer
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять