A vulnerable application can allow memory buffers to be manipulated by a crafty attacker. In this video, you’ll learn about buffer overflow vulnerabilities and how they can be used by an attacker.
<< Previous Video: Injection Attacks Next: Replay Attacks >>