Description: <div style="text-align: justify;">This is Part 4 of the Format String Vulnerability Primer video series. Please begin by watching Part 1 if you have not already done so. The prerequisite for this series is Assembly Language and Buffer Overflow basics. If you are not familiar with these topics, please go through the detailed Assembly Language Primer for Hackers and Buffer Overflow Primer for Hackers video series which I have created. <br><br>In this video we will look at how a Format String Vulnerability can be used to view the program stack. This is very interesting because now an attacker can know exactly what is present on the stack. This can lead to information leakage and sometimes even critical credentials such as passwords can be found, depending on the architecture of the vulnerable program. It is important to note that in most cases knowing what is on the stack is the staging point for more sophisticated attacks. <br><br><br><br><br><style type="text/css">body { background: #FFF; } </style> <br></div>
Tags: fun ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thanks again for an other one.
Awesome video! This series has been really helpful - please put up more
Looking forward to the next few videos on this subject - helping with my MSc revision!
Thanks for another great video, hoping to see part 5 soon!
I am looking forward to watching up-coming videos.
Can't wait until you bring us more. Do you have schedule or something? =)
I'm liking these series very much, but that 4th video should have just been a 1 or 2 minute add-on to the 3rd.
Thanks for keeping the art of assembly alive!
Hi Vivek,
Thanks for these awesome video series! Your explanation is very good to understand even if I don't manage c++ language. I've learned a lot from these series, and will recommend them to everyone interested in security.
I've been wondering if there's already a follow-up for these series available? I ended up this video and was wondering where the series continues. (can't find them yet).
Thanks again, and keep up the good work!
Thank alot once again. It would be really nice if there were some more videos continuing the various exploits that occur in format string vulnerabilities
Rock! As usual, another excellent series. So clear, so easy to fully comprehend.
On to the Exploit Research series!
Hi Vivek,
Thanks alot for the great video series. Very clear and comprehend-able.
Wondering if there is any schedule for the next videos?
I can't wait :)
Ehi Vivek! I just registered and the first thing I want to do is to thank you for your tutorials because thanks to you I've learned so many things which I couldn't understand before...
I hope you will find the time for continuing this and other series!
Thank you again ;)
hi Vivek thanks for these great videos , they are really helpful, i am just wondering if you could finish the last video for this series, i'll be awesome.
really very nice videos, but are these possible in any other programming language like JAVA.
Thank you a lot, Vivek. These are the most awesome format string vulnerability videos I have ever seen! I hope you can finish this series. Thx!
thank u for ur excellent work sir.... plzz upload solution for these format string attack too...
Hi Vivke,
thank you for the great work. I would very grateful if you can complete the series ....
Thank you
^ ya true that, eagerly waiting for more videos.
Sir, you are always the best!! and can anybody tell me how to access the forum please...