What is an Integer Overflow Vulnerability? | Hacking 101

แชร์
ฝัง
  • เผยแพร่เมื่อ 11 ก.ย. 2024
  • A quick introduction to how binary integers work, what an integer overflow is, and how they can lead to software vulnerabilities.

ความคิดเห็น • 36

  • @monicapardeshi
    @monicapardeshi 3 ปีที่แล้ว +47

    Marcus' voice is so soothing. 10/10 would take a yoga class with him.

    • @redbox360
      @redbox360 3 ปีที่แล้ว +5

      Or sleep therapy, don’t misunderstand, content is very good

  • @WhatTheWeb
    @WhatTheWeb 3 ปีที่แล้ว +30

    Great video as always. I just want to note for those that may be new watching that 4,294,967,295 is the maximum for *unsigned* ints(2^32 - 1), but not *signed* ints(2^31 - 1). You'll notice the use of the unsigned keyword in the parameters that are passed. I thought it was also useful to mention that in the beginning we are treating that as an unsigned 8-bit number, so when you say the lowest value for an int is 0, you mean for unsigned ints; regular ints would not overflow to zero but rather INT_MIN.
    Also, yes, I know Marcus knows this and was just making a nice beginner-friendly tutorial. I'm just stopping by to help out the curious beginner. There's lots more fun and oddities with ints as you progress :p

  • @RobertWallhead
    @RobertWallhead 3 ปีที่แล้ว +6

    The most crystal clear explanation of overflows I've ever seen. Thanks Marcus, epic stuff.!

  • @matthewlandry1352
    @matthewlandry1352 3 ปีที่แล้ว +2

    Probably the BEST explanation at an atomic level of an integer overflow I have ever seen. Great job Bro.

  • @Treegrower
    @Treegrower 3 ปีที่แล้ว +1

    I like how you give us an intuitive real world example with the stock market, but also show us a technical example with the code. Awesome video!

  • @ikehilyard1
    @ikehilyard1 10 หลายเดือนก่อน

    You're the man, Marcus. I was searching for several integer overflow explanations and when I came across this one I stopped to make some popcorn.

  • @dxwoo55
    @dxwoo55 3 ปีที่แล้ว +5

    Very good video, straight to the point. Many thanks for sharing!

  • @Firefox991gaming
    @Firefox991gaming 3 ปีที่แล้ว +1

    I'd love to see a video in the future of how this heap overflow can be exploited. This was a great video!

  • @uchennagodfrey8343
    @uchennagodfrey8343 ปีที่แล้ว +1

    Thanks for the explanation
    Really helpful

  • @codyverdes3289
    @codyverdes3289 3 ปีที่แล้ว +3

    THANKS FOR THE VIDEO!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @deemon710
    @deemon710 2 ปีที่แล้ว

    You got to just before the point where you explain the hacking part. lol What a tease!

  • @RandyFortier
    @RandyFortier 3 ปีที่แล้ว +1

    Great explanation! The lack of memory deallocation made me twitch a bit, but that is my issue. :)

  • @catboy_official
    @catboy_official 2 ปีที่แล้ว

    Omg I understand! I've never understood this before! Thank you! 😭❤️

  • @internetwarrior666
    @internetwarrior666 3 ปีที่แล้ว +1

    Do creating a buffer overflow in an array next!

  • @cipherbenchmarks
    @cipherbenchmarks 3 ปีที่แล้ว

    Really good pratical example at the end. By the way do u still stream on twitch lol

  • @coomer8265
    @coomer8265 3 ปีที่แล้ว +1

    thanks man !!!

  • @banana-9959
    @banana-9959 3 ปีที่แล้ว

    please do more short informative videos like this.

  • @anonymous6666
    @anonymous6666 3 ปีที่แล้ว

    keep up the great videos marcus!

  • @itsme7570
    @itsme7570 2 ปีที่แล้ว

    Best cyber security content on TH-cam hands down. If you disagree I must not know the channel you speak of so drop below 👇

  • @NvrSwm
    @NvrSwm 3 ปีที่แล้ว +1

    Interesting that it interprets the 4billion to set the sign bit in the signed int. Anyways nice video, thx!

    • @MalwareTechBlog
      @MalwareTechBlog  3 ปีที่แล้ว

      In signed integers the highest bit is the sign (1 for negative and 0 for positive), so setting it will flip the value to negative.

  • @DonMayfield
    @DonMayfield 3 ปีที่แล้ว +1

    Very similar to the date over flow in 1999 to 2000 otherwise known as Y2K programmer problem.

  • @parthgol
    @parthgol 3 ปีที่แล้ว

    please make a video on how DLL injections work

  • @kalopseeia1617
    @kalopseeia1617 3 ปีที่แล้ว

    Can you reverse a real virus like wannacry , Step by step ,. or doing a program with have vulnerability like buffer overflow and install to other pc then exploit it over the network ,

  • @Danny-SSH
    @Danny-SSH 3 ปีที่แล้ว

    Well I'd be damned I learned something today.
    Thanks👍

  • @johnsnow1062
    @johnsnow1062 3 ปีที่แล้ว

    Cool....

  • @frogball5819
    @frogball5819 2 ปีที่แล้ว

    greetings to Kevin :)

  • @soulsnatched
    @soulsnatched 3 ปีที่แล้ว

    aka a systems 2 fever dream

  • @Crono1020
    @Crono1020 2 ปีที่แล้ว

    A comment in the last The Spiffing Brit video get me here

  • @naota3k
    @naota3k 2 ปีที่แล้ว

    3:13 _very_ not stonks :(

  • @Jaapa12
    @Jaapa12 3 ปีที่แล้ว

    ok hacking is not for me but nice video

  • @hardingbrianna1437
    @hardingbrianna1437 3 ปีที่แล้ว

    The tacky dragonfly externally license because art alarmingly spoil beside a receptive height. heavenly heavy hellish, far unshielded

  • @JRocLaHey
    @JRocLaHey 2 ปีที่แล้ว

    so type III civilization would be considered to adapt and operate over 64 and even 128-256 bits os, which type I utilizes at 64 for now, wonder how long for 2048 bits embedded n computing systems or 4096 os🚆