HACKED! How a Buffer Overflow Exploit works, plus Code Red!

Поделиться
HTML-код
  • Опубликовано: 16 янв 2025

Комментарии • 580

  • @vincei4252
    @vincei4252 3 года назад +136

    I'll never forget the first time I saw Code Red in our lab. I had a FreeBSD server that I used for various things which was running apache. I came into the lab one morning and saw there were these strange errors in the system logs. I called the IT department and advised them of what I was seeing and I was basically told to get lost - I was a contractor at the time. I escalated this to my boss who escalated it to his boss then all shit hit the fan. Fun times. BTW, this was in a giant healthcare organisation with a presence across the globe.

  • @Lupinicus1664
    @Lupinicus1664 3 года назад +149

    Good video, clear explanation. As a mainframe assembler programmer from the 80s I was surprised by the C functions that made assumptions around 'looking for' e.g. a 'string terminating character' and not insisting on somewhat more control over what you were doing. Later when using C myself I discovered how easy it could be to get in a mess. Definitely a good and well-presented video, thank you. While I was already very familiar with the exploit (I've been in cyber security >15 years) this was a smooth and clear description. The more people aware of these elementary exploits the better.

    • @DavesGarage
      @DavesGarage  3 года назад +30

      Thanks for the kind words! If you have any cool language experience that would apply to our Primes project, please check it out on Github! I'd love to see a System/360 assembler version that we can run in an emulator!

    • @gast128
      @gast128 3 года назад +5

      The standard C library has some issues with these unchecked string buffer access and the varying convention of putting source or target as first argument. Long time ago I had to solve mysterious crashes in an application and it had these unsafe string buffer access all over the place. Any serious programmer would have made a safe string struct wrapper or use C++.

    • @RupertReynolds1962
      @RupertReynolds1962 3 года назад +4

      Me too. Moving from 1990s MVS/ESA to x86 I was shocked at the amount of blind trust placed in other code and the incoming data. gets() is the classic example--ouch!
      I ended up writing my own functions for almost everything, and then my own compiler (long story).
      I like the idea of trying primes on S/360.
      For anyone unaware, the "TK4-" Hercules install with MVS 3.8 is literally TurnKey.

    • @rty1955
      @rty1955 3 года назад +9

      I began in Unit Record Equipment, 407s etc then moved to 1401, 360, 370, 4300 series, then S390. I have written millions of lines of code in mainframe assembler and even some micro code on a 360/30.
      I built my own microcomputer utilizing IBM Op codes and EBCDIC so i could test my code before getting valuable actual machine time to test.
      Once I got my code running on the mainframe I crashed the program by implementing an invalid Op code from the front panel. I got a core dump, then corrected my source code to reflect proper operation.
      I then was fascinated by the Intel 8080 and built another machine using this and the S-100 bus where I could obtain I/o cards etc. I made my own front panel as well. The whole stack pointer and very limited registers left me puzzled as to why they didnt adopt tried and true technology of IBM.
      I trained COBOL programmers how to read core dumps as well. And even got COBOL to dynamically call other COBOL programs. Something that IBM said could never be done.
      I also got mainframes to talk to another using the 3270 protocol, again something IBM said was not possible (later they developed Bisynchronis Pass Thru or BPT) this allowed applications to talk to another application directly using STD COBOL under CICS.
      I LOVE mainframe assembly programming and consider INTELs x86 model a toy that wants to play in a grown up world .
      What i could do in 32k of memory could not even be dreamed of in C or C++

    • @RupertReynolds1962
      @RupertReynolds1962 3 года назад +2

      @@rty1955 Sounds as though you had some fun over the years!
      From my POV, x86 suffers from compatibility going all the way back to its roots with the 4-bit 4004.
      x64 is a lot cleaner, and if we can just exterminate every null-terminated string I'll be happy :-)

  • @tykruszka
    @tykruszka 2 года назад +2

    I love the sinister intro followed by that cheerful and glorious smile and salute with "Hey I'm Dave"

  • @echtogammut
    @echtogammut 3 года назад +46

    As an admin, during this time, I remember people freaking out when this happened. Within the government space almost nothing was properly patched, so it is a small miracle that Code Red wasn't worse. As for patching, Microsoft's buggy patches were as much to blame as the worm itself. When a new critical patch came out, the game of chicken started. From Tuesday through the Weekend you would watch newsgroups and forums to see if this patch would take down your servers. If you were lucky you had a bare metal server clone you could test the patch on and see if it broke your company software. This was the era where being an admin meant you not only managed the servers, but you wrote the business software and managed the database.... full stack started at bare metal back then.

    • @KaziiTheAvali_inactive
      @KaziiTheAvali_inactive 2 года назад +5

      in reality Microsoft patches are still rather buggy and the only patches i ever ran while using windows were security. any other patches went by the wayside until a week after and sometimes more to make sure they didn't break shit.

    • @OriginalUnknown2
      @OriginalUnknown2 Год назад

      @@KaziiTheAvali_inactive Currently a sysadmin, and can confirm we do updates on the FIRST Tuesday of each month, 1 week before patch Tuesday. This is to make sure the updates have had about 3 weeks to get all their shit re-patched with OOB updates.

    • @MrAfistinthasky
      @MrAfistinthasky Год назад +2

      Glorious patch Tuesday, breaking forensic software every month without fail.

    • @280813jb
      @280813jb Год назад

      You should research the old Burroughs MCP tagged memory implementation and none of this would not happened. Your C program would have gotten a run time Segmented Array error as soon as the buffer length was exceeded and the program killed.

  • @printnub7585
    @printnub7585 3 года назад +11

    I have been really enjoying your channel. The last 96 seconds of this video are gold, I like that you don't take yourself so serious and are able to show the outtakes. Keep up the good work. Story 10/10 would recommend.

  • @Bassotronics
    @Bassotronics 3 года назад +5

    Me being a retired "Fork Bomb" coder, I loved this video.

    • @kjetilhvalstrand1009
      @kjetilhvalstrand1009 3 года назад

      Just badly written code, and that happens, not sure hosting service/compile farms too happy about that.

  • @13Cubed
    @13Cubed 3 года назад +8

    Well this certainly brings back some memories! I've worked in the field since 1995 (currently at MS as a digital forensics investigator.) I recently found your channel and really enjoy it. I run a security-focused channel and I can certainly appreciate the amount of time you put into making this content, especially with the high production value.

  • @aofgrant
    @aofgrant 3 года назад +51

    These are terrific accounts, *please* keep them coming! The addition of bloopers is a nice touch.

    • @DavesGarage
      @DavesGarage  3 года назад +9

      Glad you like them! If you've ideas for other topics, please do share, as I enjoy doing them! The bloopers are hit or miss, depends how it went that day, so sometimes I don't include them!

  • @StephenChapman
    @StephenChapman 3 года назад +78

    Love the direction you're headed with these types of videos, Dave! Might be a fun time to pivot to ROP-based exploits if you have any examples you think would be worthy enough to cover. :)

    • @AliTaqi
      @AliTaqi 3 года назад

      Agreed. Would love to see it.

    • @sudofox
      @sudofox 3 года назад +1

      Heh heh, I see what you did there 😆

  • @tekvax01
    @tekvax01 3 года назад +282

    The code red worm was filling my Linux web log drive partitions for months and years afterwards! Thanks, Dave for the great explainer piece to camera!

    • @DavesGarage
      @DavesGarage  3 года назад +84

      I bet a LOT of Unix admins got very used to processing the DEFAULT.IDA requests out of their logs! Of course I guess even the properly patched Windows guys would too.

    • @ACCPhil
      @ACCPhil 3 года назад +31

      Even years afterwards, I would see Code Red requests in my Linux access log

    • @TheBiggreenpig
      @TheBiggreenpig 3 года назад +12

      Was this the one which tried to scan a specific port? I remember checking the addresses showing up in my firewall log for the backdoor. I could use 2 or 3 of those (i got a lot more entries in the log). I placed a readme file in their rootdir about the backdoor.

    • @tekvax01
      @tekvax01 3 года назад +3

      @@kylestubblefield3404 nicely done sir!!

    • @matthewcaron3319
      @matthewcaron3319 3 года назад +13

      I was in University at the time, and we were all called in for the weekend, which we spent scanning the network looking for people running web servers and then making sure they were patched. In several cases, this meant breaking into offices which had somehow been re-keyed to not use the building master that we were issued as admin staff.
      Good times.

  • @dcc1165
    @dcc1165 3 года назад +1

    This is by far the best explanation of how buffer overruns work. When I first encountered such things, I felt it was a bit of "black magic", until I saw the updated source that fixes such things. It took me a great while to understand the details because the patch was only explained in terms of the fix: to perform bounds checking on a buffer. Obviously the reason for such vagueness is to prevent exploits from spewing everywhere. Thanks for the deep-dive into how all this works....and, hopefully as you said, people will "not use their powers for evil" ;).

  • @the_real_ch3
    @the_real_ch3 3 года назад +67

    Mountain Dew Code Red also fueled most of my late night studying sessions in college. Stuff was great.

    • @quintessenceSL
      @quintessenceSL 3 года назад +2

      Hitting up a 7-11 at 2AM to resupply with Code Red. Made mention to the clerk the stuff seems a bit on the addictive side. He mentions he goes through a case every few days.
      My health tanked shortly thereafter.

    • @freedustin
      @freedustin 3 года назад

      @@quintessenceSL I drank so much I became allergic to red food coloring.

    • @rampagerick
      @rampagerick 3 года назад

      As I recall, when Code Red happened the Canadian version of Code Red wasn't caffeinated

  • @mossdem
    @mossdem Год назад

    Most content creators who discuss this stuff would have said '...the stack is more complicated that this for several reasons', ending there and moving on. You, on the other hand, have just made me a very happy man. As soon as I heard 'Firstly,...' I knew you were going to detail why its more complicated which is exactly why I am now subscribed. Love to learn and you're a great teacher and story teller!

  • @theNeWo1
    @theNeWo1 3 года назад +39

    Thanks mate for this, as a hobbyist programmer it's always interesting to see the full power of the debugger in an interesting and engaging way.

  • @CheeseFriesAndCoffee
    @CheeseFriesAndCoffee 6 месяцев назад

    Yours is the only channel for which I consistently leave a like. I like the way you honestly express your motivation and then include a simple please. Also I literally like almost all of your videos.

  • @boblake2340
    @boblake2340 Год назад +1

    I love your channel! My career spans from 1977 to 2010. I lived through most of what you discuss!

  • @cod4volume
    @cod4volume 2 года назад

    After all these years…. I still double check my targets, but I yell under my breath “FIRE!!!!” Love your content. Thank you for all you do.

  • @AdrianLeviAU
    @AdrianLeviAU 3 года назад +1

    I'm not a developer, coder or anything related to IT except I look after my own business systems and have coded in the past and am old enough to have been around for most of these stories :-)
    You're easy to listen to Dave, I enjoy the background.

  • @GodmanchesterGoblin
    @GodmanchesterGoblin 3 года назад +2

    I missed this when it came out. This was a really good explanation of the buffer overflow exploit. My software experience is limited (I'm mostly a hardware guy) but I programmed in assembler and BCPL in the 80s and a little C in the 90s. I understood pretty much all of this. Thank you.

  • @i12flytoday
    @i12flytoday 3 года назад +5

    I really like your videos like this where you tell a story and explain how something happened. I especially like the ones where you track down inside information of what was actually said or done by the people that said or did it. It's a extra bonus when examples, such as the buffer overflow demonstration, are presented like this video.

  • @jamesweatherwax4444
    @jamesweatherwax4444 3 года назад +3

    You editing has really improved, it is very entertaining. And the content is even better.
    Keep up the good work!

  • @AlergicToSnow
    @AlergicToSnow 3 года назад

    My God. I discovered this series by accident and I’m glad I did. I haven’t written a line of code for a couple of decades but this sure takes me back to my roots (pun intended). I was, at one time, quite proficient in C/C++ and assembler. There was a time when we had no choice but to write and maintain our own drivers for new hardware on some platforms. I go back to the time when all our programs had to be written in 32K overlays and manually swapped to execute. I’m fascinated by the idea that techniques I used back in the day will still work 30 years later.

  • @irina15160
    @irina15160 3 года назад +19

    Wow, was just thinking of researching something along these lines. Thanks, Dave! Now i can properly enjoy my Friday evening. Let me grab a cold one, Cheers!

  • @moonasha
    @moonasha Год назад

    I don't know much about low level stuff, so seeing the memory addresses like that, and the EBP being overwritten was really cool

  • @davida1hiwaaynet
    @davida1hiwaaynet Год назад

    Fascinating. Thank you Dave!
    Back in the days before file storage services like OneDrive, Dropbox, Google Drive etc. I used the IIS function of my home PC to save files from my work laptop as I traveled. I had a static IP on an early DSL line, so it was pretty convenient. Somehow; someone managed to get my IIS password. They didn't install malware, but they did uploaded several massive password-protected RAR archives which were subsequently downloaded many times, using all the bandwidth of the connection. I still don't know how they got into the server, but it was frustrating. I never figured out the contents of the archives, but I expect they were pirated movies or pirated software of some type.

  • @dovedozen
    @dovedozen Год назад

    Your blooper reel on this one makes me feel extremely seen; I don't Make Videos or anything but the way I talk to myself anytime I'm alone while I'm just doing whatever is a LOT like that, lol.
    Been really enjoying your channel & learning some interesting stuff as well! Thanks for sharing such a cool assortment of information here :3

  • @DodgeHooker641
    @DodgeHooker641 2 года назад

    I enjoyed watching your bloopers at the end of the video and presenting them in B&W was an extra nice touch. I hope you'll consider doing this in all of your new videos too

  • @andyo22
    @andyo22 3 года назад +1

    Your code was a concise and perfect example of what can happen with a buffer overflow. It brought back early-90s memories of unintentional buffer overflows, when my code would cause my DOS machine to beep (ASCII 07, I believe) and display blinking characters. Ah, the good old days. :)

    • @_Mentat
      @_Mentat 4 месяца назад

      I remember when the ASCII BEL character (07) rang an actual bell.

  • @Sir_Uncle_Ned
    @Sir_Uncle_Ned 3 года назад +1

    It really is interesting to see a programmer's perspective on vulnerabilities rather than just hearing people reporting on it.

  • @timruffer7730
    @timruffer7730 Год назад

    Dave, I love your podcasts and most importantly your edits at the end! I laugh at each edit and wonder how you ever geta podcast completed! Keep it up!

  • @BrodieFairhall
    @BrodieFairhall Год назад

    This is such a fantastic video, both entertaining and educational.
    I work mostly with embedded systems which lack a lot of the protections a full blown OS and a lot of static analysis tools provide. More and more embedded systems are being connected to the internet each day and I think we will see them experience many of the exploits that have been protected against, on servers and desktops decades ago.
    It's videos like these I share with many embedded Devs to hopefully help them understand and protect their code against attacks like this while maintaining lean code bases.
    Thank you!

  • @BeeHiveEater
    @BeeHiveEater 11 месяцев назад +1

    We all need you as our wise teacher. I feel real respect for you, and yes, I loved your software when it was fresh back in the day. A Russian software developer here. Get me right, I believe we engineers can still live in our creative world where borders and politics do not exist.

  • @JeffJennings82
    @JeffJennings82 3 года назад +3

    This is one of my favorite videos on this site so far. A little over my head initially. Please do more of these with similar explanations as to the buffer overrun explanation. I tried to get into similar stuff like this a long ago using the SoftIce debugger however couldn't find a replacement (with the same ease and power) for this after windows xp.

  • @dimasveliz6745
    @dimasveliz6745 3 года назад +7

    Very well explained man! Always a pleasure to watch these videos!

  • @jetblast1212
    @jetblast1212 Год назад

    Dave, not only have you had a hand in creating many useful and well-used features of popular operating systems, you're a great storyteller too. Keep making good content.

  • @magethenrogue3035
    @magethenrogue3035 3 года назад +1

    I really like your stories! I was a nerdy kid in a small farm town the 90s. I dreamed of computers but had little access. So learning what was actually going on at the time is very satisfying. Thank you

  • @Braddeman
    @Braddeman 3 года назад

    I appreciate you showing a basic buffer overflow without overrunning the buffer into the heap or heap smashing. Still gets the point across with out allowing for system wide access. Although I suppose since code red already had system access they didn’t have to heap smash just execute the payload.

  • @rikidawson7510
    @rikidawson7510 3 года назад

    Its good to watch someone that actually knows what they are talking about.

  • @fredericmokren9737
    @fredericmokren9737 3 года назад +2

    This is a great explanation. Possibly the best I've ever seen.Thank you.

  • @glenospace
    @glenospace 3 года назад +1

    I loved the blooper part. Man, makes me feel so much better about recording shorts. I always have a foot in my mouth as soon as the camera is rolling.

  • @yh_hat_trick491
    @yh_hat_trick491 3 года назад +6

    I loved this video, please do more like these. The small code demo was great :)

  • @LuzuVlogsGamer
    @LuzuVlogsGamer 5 месяцев назад

    The beginning of the video was so intriguing I would probably watch a full video just you explaining it like that xo

  • @hamishbaird5400
    @hamishbaird5400 3 года назад +23

    Hi Dave love the channel I’d be really interested in hearing you explain more low level computing concepts for example someone mentioned a hook to me the other day and even after reading up on it I’m still somewhat confused

    • @DavesGarage
      @DavesGarage  3 года назад +48

      Thanks! I'd love to show how Windows Hooks work, they're cool. I once wrote a "Task Recorder" app called WinMonkey that set various hooks and then recorded everything you did, so it could play it back as a macro. I got it to about 99.5% reliable, which I deemed a "tech support nightmare" so I never released it! But I got plenty of experience.
      Long story short, you write a DLL with an entry point called "MyWindowsHook() in it". If you set a global hook, when you do so, your dll is loaded into EVERY windows process immediately. I assume threadattach runs for every thread, etc... Then your DLL is called whenever the thing you've hooked happens. Let's say it's a keyboard hook. So every time anyone presses a key, every windows process calls their "MyWindowsHook()" function in your DLL. But each is loaded separately into each process, and they can't see each other. When I did it, I created a C++ template for a shared memory object that could be seen by all instances, and I remember that being complicated to write (sempahores, mutexes, etc) but handy to use!
      It's been a lot of years, I'd have to look back, but I think you can hook down to the Get/Peek message level... so you can inspect and/or modify any and every windows message sent or received by any process. It's an immense amount of power, and a real bitch to debug when you make a mistake!

  • @travsgarage
    @travsgarage 3 года назад

    This is awesome. Absolutely love the idea of covering viruses and bugs through history, and showing how they worked. Please make more of these! Great work Dave!

  • @McFlyT28
    @McFlyT28 3 года назад

    Loved learning about how the heap stack works on a deep level! The information on the worm was the cherry on top.

  • @richardneel6953
    @richardneel6953 2 года назад +1

    This virus still stands as one of my biggest technology nightmares. I work for a large ISP and our CMTS's (cable modem routers) couldn't keep up with the number of new sessions that were being created by our customer's infected Windows machines - effectively taking our entire network down for days. We learned how to find the signature of infected machines on our network, shut down each one manually, and tried to contact the customer to beg them to patch their machine. The problem is, the customers couldn't download the update from MS because we shut their access down due to the virus! So we had to open them back up, one by one, until enough of our customers patched to break the session-overrun log jam. Once we got things under control, I remember me and my colleagues installing fresh versions of Windows, plugging them into the Internet with no firewall/protection, and they would be infected with code red in literally seconds. It was a terrible virus. Thanks Microsoft.

  • @rodneysmith1750
    @rodneysmith1750 3 года назад +1

    Great video Dave, I for one appreciate your dedication to the art of programming and this channel.

  • @Heater-v1.0.0
    @Heater-v1.0.0 7 месяцев назад

    I love these trips down memory lane. When Code Red hit I had been using Linux for a few yers already. I recall watching millions of hits on my Apache server at home from Code Red. I then found a request on the net that was crafted to target such a buffer overrun. Of course I could not resist trying it on some random servers. Soon I found I had a directory listing and access to some server or other. At which point I thought better of that game and backed out.

  • @thetrevster14
    @thetrevster14 3 года назад +2

    Great content! I learned a lot from this. You show examples without going overboard and do a great job with the explanations. Please, keep it up!

  • @filteredjc4653
    @filteredjc4653 Год назад

    Great description of how a buffer overrun works! Thanks Dave

  • @f15sim
    @f15sim 3 года назад +1

    I was involved with cleaning up a few servers hit with Code Red. Wasn't a fun experience. Thanks for the clear explanation of how malicious payloods are delivered. :)

  • @bigtomlapointe6793
    @bigtomlapointe6793 2 года назад

    Love the outtakes at the end of the video And the content of the video is amazing

  • @adamhoelscher1058
    @adamhoelscher1058 3 года назад

    For how common these attacks are, there is drought of videos that do even half this well explaining. Thanks for demonstrating.
    Also, the blooper real is a nice touch

  • @TheNitroPython
    @TheNitroPython 3 года назад +2

    I love this channel man, I’ve been super interested lately about low level programming along with just interesting software engineering concepts such as your quake video. I have never heard of you before yesterday but as a cs student your skill set is something I strive to achieve. Thanks for the videos

  • @danytoob
    @danytoob 2 года назад

    Hey Dave - Enjoying your vids serves to make me wish even more I actually understood even a small bit of the details. I've probably got about 10 years on you, and even considering attempting to learn enough to grasp the bits mostly makes me need a nap. Regardless, fascinating and entertaining.
    Thanks! ... DT

  • @MikeLeed
    @MikeLeed 3 года назад +1

    The bloopers are great lol, keep up the good work mate!

  • @chrisstone9173
    @chrisstone9173 Год назад

    Thanks Dave that was a fun episode! … like the bloopers too 😊

  • @msthalamus2172
    @msthalamus2172 3 года назад +4

    I remember this exploit very well! I also remember the month the whole company focused on nothing but a search-and-destroy mission to find exploitable buffer overruns and other security enhancements (February 2002 IIRC), resulting in XPSP2. There were a lot of long hours on the IE team that month. Have you thought about doing a video on the Trustworthy Computing initiative?

  • @Gregorovitch144
    @Gregorovitch144 3 года назад

    Top vid. I always enjoy listening to folks who actually know what they are talking about.

  • @michaelwaterman3553
    @michaelwaterman3553 2 года назад

    Hey Dave, brilliant video again! I so wish you could have been my mentor when I worked at Microsoft!!! Keep up the good work!

  • @louiscloete3307
    @louiscloete3307 3 года назад +25

    Dave: "As you can see, my channel is still fairly small."
    Me who is subscribed to classical music channels which are 10 years old with

  • @jgoopra
    @jgoopra 3 года назад +1

    Probably my favorite video of yours. Keep it up.

  • @bradleygriffiths6390
    @bradleygriffiths6390 6 месяцев назад

    I must say, I do enjoy me some bloopers at the end lol. Thanks for sharing!

  • @denbusa1965
    @denbusa1965 Год назад

    thank you for your time and always a pleasure to watch your videos keep up the ace work 🙂

  • @1wisestein
    @1wisestein 3 года назад

    Wow, am I ever glad I took that assembly course. I’m surprised at how much sense this makes to me.

  • @HippieInHeart
    @HippieInHeart Год назад

    Pretty interesting. I already knew about the stack and that putting too many things into unsafe functions could result in access to wrong addresses but so far I haven't been able to figure out how this would be utilized to inject malware. Thanks for the video.

  • @DocMAX
    @DocMAX 5 месяцев назад

    Can't believe a former Microsoft programmer is ending up making RUclips videos, how cool is that. I did live in the Win95 era.

  • @LoneWolfZ
    @LoneWolfZ 3 года назад +2

    This was one of my first informal lessons in computing being heavily involved with MUDs back in the day. They were all poorly coded out-of-the-box and much fun/headaches could be had depending on whether you were an owner or user. Pretty much any place there was text input (it was all text), you could bet it's length wasn't checked. Segmentation faults a plenty!

    • @lunafoxfire
      @lunafoxfire 3 года назад

      haha that sounds like a good time

  • @baronvonfritz
    @baronvonfritz 3 года назад

    I don't know why I listened to 25min of a foreign language gibberish, but for some reason, I feel compelled to learn to code.

  • @neilbradley
    @neilbradley 3 года назад +2

    I worked for a very large tech company in the early '00s when this happened. At this company, Code Red itself did far less damage than the overreaction of the IT group, who were overzealous, turning off ethernet ports to any system running IIS and hampering anyone's ability to get any real work done. To make matters worse, the IT group declared victory and patted themselves on the back in an internal online article, to which (being this was an engineering company) all of the software and hardware engineers responded with thousands of angry blog posts in response, demanding they resign in shame for not matching the response to the threat.

  • @jemesmemes9026
    @jemesmemes9026 3 года назад

    Oh my goodness your visuals are amazing! 🤩 What camera do you use?

  • @pywacketturtle-swain7353
    @pywacketturtle-swain7353 3 года назад

    Thank you for this thoughtful and entertaining look at Code Red. I've watched several of your other videos and love them all. Cheers.

  • @moe-eh5vi
    @moe-eh5vi 2 года назад

    Excellent explanation! I loved the story telling parts as well.

  • @TechDeals
    @TechDeals 8 месяцев назад

    Watched the whole video, thanks Dave, you're awesome. Take my sub and like! :)

  • @kloidulent
    @kloidulent 3 года назад +2

    Great video Dave - not going to pretend that I fully understood all of this but very interesting nonetheless. Thanks mate :)

  • @DanEaton73
    @DanEaton73 Год назад

    Strong Rod Serling for the intro. That was fun.

  • @levbronshtein7727
    @levbronshtein7727 2 года назад +1

    A very insidious side effect of code red was that infected machines attempt to set up thousands of connections per second. I was working for a tiny ISP at the time, back then very few routers did TCP handshaking in hardware (even if they did promise hardware routing or layer 3 switching as Cisco called it) and this meant that our carrier grade router's CPU was inundate with connection set up and tear down tasks.

  • @danielwoods7325
    @danielwoods7325 Год назад

    This is absolutely fascinating, great video!

  • @AdamSoundOfficial
    @AdamSoundOfficial 3 года назад +4

    Amazing video as always! Hi from Italy ^^

  • @chasegraham246
    @chasegraham246 3 года назад +3

    I always appreciate a good Archer reference.

    • @DavesGarage
      @DavesGarage  3 года назад +2

      Can you believe that's the ONLY instance of anyone EVER saying "Use your powers for good" on TV that I could find? I thought it'd be common, but Archer is the only one!

    • @TheCodeDaemon
      @TheCodeDaemon 3 года назад

      @@DavesGarage Well with a bit of hair gel you could pass for Krieger :P

    • @alakani
      @alakani 3 года назад

      @@DavesGarage Bob's Burgers S4E16, Deadpool, Jimmy Neutron movie, Paw Patrol movie, there's lots :D

  • @jason_liam
    @jason_liam 3 года назад +3

    Awesome video Dave. Very informative.

    • @DavesGarage
      @DavesGarage  3 года назад +2

      Glad you enjoyed it! Trying to strike a balance of "real technical info" without scaring too many away!

  • @itperdition
    @itperdition 3 года назад +4

    This reminds me of my college assembly project. My project overwrote parts of my professors OS because of a math error on my part. I did get a passing grade because the project did most of what it was supposed to, where other's projects wouldn't even run. Good times.

  • @connecticutaggie
    @connecticutaggie Год назад +1

    Thanks for the great story. One of my favorite books from around that time was The Cuckoo's Egg by Clifford Stoll.

  • @Drew_TheRoadLessTraveled
    @Drew_TheRoadLessTraveled 3 года назад

    Awesome Presentation, Informative and entertaining. Someone buy that Man a beer.

  • @CybernetixxxWeb_Solutions
    @CybernetixxxWeb_Solutions Год назад

    WOOOW DAVE YOUR ABILITY TO COMMUNACATE SUCH COMPLEX PROCCESS AND FUNCTIONS HAVE BEEN TO THE LIKE THAT IVE NEVER SEEN DONE SO ELIQUENTLY AND SO GRACEFULLY IM TRULY IN GREAT ADMERATION OF YOU AND ALL OF YOUR ABILITIES THAT IM NOW A TRUE FOLLOWER OF ALL OF YOUR MASTERPEICES AND I WISH TO EVER BE JUST A FRACTION OF WHAT YOUVE BECOME AND A POSITIVE LEADER AND A TRUE ROLE MODEL FOR MANY GENARATIONS TO COME MY BROTHER... THANK YOU FOR ALL THAT YOUVE DONE FOR THE GREATER GOOD FOR ALL OF HUMANITY WITH ALL OF YOUR GREAT KNOWLEDGE THAT YOU SHARED!!!

  • @TheGrimravager
    @TheGrimravager 3 года назад

    very nice explanation of how to actually get code to run through a buffer overflow exploit :)

  • @markblanc5993
    @markblanc5993 Год назад

    Like the content very much like the outtakes even better

  • @MafiaSniper
    @MafiaSniper 3 года назад +1

    Very entertaining yet informative! Great stuff.

  • @AceSyntaxx
    @AceSyntaxx 2 года назад

    Love the out-takes :)

  • @theRealRindberg
    @theRealRindberg 2 года назад

    Some years ago I "slowed" a buffer overflow that caused a program to crash by declaring an 8 kB char array (giving the overflow to have some space to mess with). I never found the cause of the buffer overflow. That is the ugliest "solution" I've made... but it worked ;)

  • @livefreeprintguns
    @livefreeprintguns 3 года назад +1

    The first buffer overflow exploit I wrote was back in 2002 for the Cisco VPN client under Linux giving instant root privileges, developed and exploited under Gentoo Linux and also by-passed the additional security measures they implemented back in the day and was filed under CVE:
    2002-1447.

  • @hanznel8488
    @hanznel8488 3 года назад

    Great video Dave. Entertaining and informative. Keep them coming.

  • @alexandermaasland3494
    @alexandermaasland3494 3 года назад

    Thanks again Dave for explaining this in an understandable format :) Loved it!!!

  • @Ai-dz7ys
    @Ai-dz7ys 3 года назад

    Love this kind of story Dave. More please.

  • @saintsinister8463
    @saintsinister8463 3 года назад

    I enjoyed your video very much, even if it went right over my head, due only to my ignorance. Still very interesting and well put together. Hopefully one day I will be able to follow along properly. Keep up the good work!!!

  • @matthewstott3493
    @matthewstott3493 3 года назад +2

    I remember Code Red. It targeted Microsoft's IIS web server. My internet was so slow because everyone on my local cable modem ISP was infected and swamping the bandwidth for everyone. After examining some of those PC's that were attacking I found hundreds of freshly imaged corporate PC's all with IIS enabled by default on workstations. What sort of IT worker would do that? A very bad one. A white hat released a perl script that would run on Apache and it would automatically use the worms own backdoor to remove the infection and patch the IIS server. Wherever this was deployed, it greatly reduced the traffic jam caused by Code Red. The name of this Perl script? ICE as inspired by William Gibson's Neuromancer. In the 1984 cyberpunk fiction, ICE was an automated technology which stood for Intrusion Countermeasures Electronics. Since everyone was jacked into VR hacking away and surfing the net. ICE could potentially fry an attackers rig or perhaps their brain.

  • @nrobidoux
    @nrobidoux 3 года назад

    I'm new to your channel. I'm no CS savant but I love what I've seen. This is my sixth video in my binge watching adventure. :)

  • @coulrophobia7018
    @coulrophobia7018 2 года назад

    I'm new to your channel but i love your vids. Specially the stories from the ms office 😂 the outro wins on this one though xD

  • @hineko_
    @hineko_ Год назад

    you are kinda relaxed for a guy who worked hand in hand with people creating all that flawed and bugged software that made all those viral epidemics possible

  • @bou222
    @bou222 Год назад

    I respect you and your work. Thank you, Dave, for making such great content and sharing such fascinating information!