0:00
this language is one of the most widely
0:02
used programming languages it's used to
0:04
write programs for both windows and
0:06
Linux operating systems in fact the C
0:09
language forms the foundation of the
0:11
Linux kernel C is considered a middle
0:14
level language if you don't know about
0:16
the middle language basically we have
0:18
three types of highlevel programming
0:21
languages which includes python bash
0:24
Ruby and many more highlevel languages
0:28
are easy to understand but they are slow
0:31
middle level languages on the other hand
0:34
are slightly difficult to learn but they
0:36
are faster as compared to highlevel
0:38
programming languages they use a special
0:41
compiler to convert source code into
0:44
binary lastly we have low-level
0:47
languages like assembly they are very
0:50
difficult to learn and take a very long
0:52
time to write a program but they are
0:54
fast as Lightning because they directly
0:58
Hardware before we dive into hacking
1:01
let's explore C history developed in the
1:04
1970s by Dennis Richie C is primarily
1:08
used to create operating systems device
1:11
drivers and kernels as mentioned earlier
1:15
the Linux system is also based on the C
1:17
language while languages like Python and
1:20
Bash are also common it's not entirely
1:23
accurate to say C is used mostly for
1:25
hacking here's what makes C attractive
1:28
to hackers unlike higher level languages
1:30
that abstract away Hardware details C
1:34
allows programmers to directly interact
1:36
with memory addresses and manipulate
1:38
Hardware resources this fine grained
1:41
control is valuable for hackers because
1:43
it helps them exploit vulnerabilities
1:45
like buffer overflows buffer overflows
1:48
occur when data overflows a designated
1:51
memory buffer and Spills into adjacent
1:53
regions hackers can exploit this to
1:56
overwrite critical parts of memory
1:58
potentially injecting malicious code to
2:01
gain control another vulnerability
2:03
enabled by C is Kernel level programming
2:07
C allows creating programs that interact
2:10
directly with the operating system core
2:12
called the kernel this access can be
2:15
used to bypass security restrictions or
2:18
manipulate system behavior in
2:20
unauthorized ways code is known for its
2:23
speed and efficiency this is crucial for
2:26
hackers because it helps them build
2:27
faster exploits efficient code
2:30
allows crafting exploits that work
2:32
quickly potentially before security
2:34
measures can react this is vital in time
2:37
sensitive attacks additionally C helps
2:41
them build lightweight malware hackers
2:43
can develop smaller malware programs
2:46
written in C that consume fewer
2:48
resources making them harder to detect
2:52
since many operating systems and core
2:54
software components are written in C
2:57
understanding C allows hackers to
2:59
reverse engineer these programs by
3:01
analyzing the C code hackers can gain
3:04
insights into their functionalities and
3:07
potentially discover vulnerabilities
3:09
this knowledge also helps them develop
3:12
exploits understanding the inner
3:14
workings of a CW written system allows
3:16
for crafting targeted exploits specific
3:20
functionalities C is a popular choice
3:22
for creating shell codes small pieces of
3:25
malicious code injected into a system
3:28
C's efficiency allows creating compact
3:31
shell codes that can bypass security
3:34
filters shell codes written in C can
3:37
directly interact with the system's
3:39
hardware and memory giving hackers more
3:41
control hackers can also leverage C to
3:45
build custom hacking tools for specific
3:48
needs C's flexibility allows for
3:51
tailored functionality by creating tools
3:54
that automate specific tasks in the
3:56
hacking process saving time and effort
3:59
developing tools that Target specific
4:02
vulnerabilities in lesser known software
4:04
or systems is another application in
4:08
conclusion C's low-level control
4:10
efficiency and historical prevalence in
4:12
system development make it an attractive
4:14
language for some hackers seeking to
4:17
exploit vulnerabilities and manipulate
4:19
systems directly however it's just one
4:22
tool in a hacker's Arsenal other
4:24
programming languages also play a role
4:26
in the ever evolving landscape of cyber
4:30
if you found this video useful and
4:32
learned something new please subscribe
4:34
to policy point and give it a thumbs up
4:37
please let me know in the comments what
4:38
else you want to see related to ethical
4:40
hacking and cyber security thank you for
4:43
watching and bye for now watching and