1 00:00:00,330 --> 00:00:05,820 Now, in this, we'll be talking about this bureaucratic one application does not handle the input that 2 00:00:05,820 --> 00:00:10,760 accurately data will flow into memory, just like stack and application crushed. 3 00:00:11,160 --> 00:00:17,790 So this application has something, but of course, every application has some input, like finding 4 00:00:17,790 --> 00:00:23,230 put out a user input and whenever the application doesn't handle that correctly. 5 00:00:23,250 --> 00:00:31,020 So if the application takes 30 alphabets as an input and if we send off half of it, then application 6 00:00:31,030 --> 00:00:31,950 should handle Gartree. 7 00:00:32,280 --> 00:00:39,270 If it does not handle correctly that extra Compte Cartus mellifera into the memory regions like stack 8 00:00:39,270 --> 00:00:43,830 and application gatecrasher and attackers can control instruction. 9 00:00:43,850 --> 00:00:45,370 But this is very important. 10 00:00:45,390 --> 00:00:50,760 And this interesting pointer points to the next instruction to be executed and what this attacker does. 11 00:00:50,760 --> 00:00:56,550 His attacker on the first application with the data and within the data, the instruction point to go 12 00:00:56,560 --> 00:01:03,570 down so well for so attackers can preserve the order of Destruction 2.0 to their own code. 13 00:01:03,840 --> 00:01:05,520 So when they're decoding. 14 00:01:06,970 --> 00:01:14,630 They will send a buffer and in which the U.S. point that's all by the actress pointed to their own attackers, 15 00:01:14,710 --> 00:01:20,530 also sent their own court, they make sure that U.S. pointer is pointing to the court and then execute. 16 00:01:20,530 --> 00:01:28,160 The expert asked their attackers get they are by nature, according to the code they have written. 17 00:01:28,690 --> 00:01:34,530 So this is Ottawa, the Buffalo four that you see in the separate section for the Buffalo FedEx.