Buffer overflow vulnerabilities are some of the simplest vulnerabilities that can exist in an application. This course discusses how poor memory management can leave an application open to attack, how the vulnerability can be exploited and potential mitigations to reduce the probability and impact of vulnerable code.
Introduction to Buffer OverflowsDuration: 1:54
This video provides an introduction to the buffer overflows course.
Introduction to MemoryDuration: 5:54
This video covers the fundamentals of memory management.
Buffer OverflowsDuration: 7:56
This video describes how buffer overflows can make an application vulnerable to attack.
Buffer Overflow ExploitationDuration: 10:06
This video describes how buffer overflows can be exploited by an attacker.
Buffer Overflow Case StudyDuration: 4:42
This video describes a case study of an application containing buffer overflow vulnerability.
Buffer Overflow MitigationsDuration: 16:29
This video describes mitigations for buffer overflow vulnerabilities.
Buffer Overflow DemoDuration: 3:39
This video demonstrates exploitation of buffer overflow vulnerabilities.
Meet the author
Howard Poston is a cybersecurity researcher with a background in blockchain, cryptography and malware analysis. He has a master's degree in Cyber Operations from the Air Force Institute of Technology and two years of experience in cybersecurity research and development at Sandia National Labs. He currently works as a freelance consultant providing training and content creation for cyber and blockchain security. He can be reached by email at firstname.lastname@example.org or via his website at https://www.howardposton.com.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."