From the course: Secure Coding in C

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

What the bad guys look for

What the bad guys look for - C Tutorial

From the course: Secure Coding in C

Start my 1-month free trial

What the bad guys look for

- [Instructor] To accept what makes the C language vulnerable, it helps to think like a bad guy. Or it helps to think like a good guy who's aware of the vulnerability and wants to let everyone know about it. In 1998, the first internet worm was released. It was amazingly successful, infecting thousands of computers and costing dearly to remove. Its success was based on a weakness in the sendmail program and a buffer overrun vulnerability in the finger daemon. On a positive note, the worm brought awareness to the innocent nature of the early internet and known issues with the C programming language. Functions like gets lacked bounds checking. So it was possible, and proven by the worm, that a buffer overflow filled with the right character values could have a disastrous effect on the entire computer system. The gets function has since been deprecated in every C compiler. Using it displays a compiler warning message.…

Contents