How CPUs Access Hardware - Another SerenityOS Exploit
When I looked at another SerenityOS exploit, I learned something new! The hack is very creative and directly interacts with hardware. I never really understood how modern CPUs interact with peripherals, so this was very interesting to me.
Previous SerenityOS videos:
https://www.youtube.com/watch?v=qUh507Na9nk
https://www.youtube.com/watch?v=oIAP1_NrSbY
Linus' wisdom2 exploit: https://github.com/allesctf/writeups/blob/master/2020/hxpctf/wisdom2/writeup.md
SerenityOS hacking: https://www.youtube.com/watch?v=DhVZ7vO69DI&list=PLMOpZvQB55bcRA5-KjvW7dVyGUarcqZuL
Vulnerable SerenityOS version: https://github.com/SerenityOS/serenity/tree/5505159a94c226d0c8a5e82a163a6d37a9404c57
Binary Exploitation Playlist: https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN
Hardware Wallet Research: https://www.youtube.com/watch?v=nNBktKw9Is4&list=PLhixgUqwRTjyLgF4x-ZLVFL-CRTCrUo03
00:00 - Intro
00:47 - Accumulating Knowledge Over Years
01:14 - The Plan For This Video
02:00 - Computers are Simple!
02:40 - Computers are Hard!
03:39 - What I Already Know About Kernels
04:58 - Missing Link Between Hardware and Software
06:00 - Andreas Summarizes Another SerenityOS Exploit
08:18 - What Are CPU EFLAGS?
11:02 - What Are IO Ports?
12:03 - Playing With EFLAGS
13:06 - Talking To Hardware via IO Ports
13:45 - Arduino Hardware Example - OUT Instruction
14:45 - Access Harddisk Controller With Ports
15:15 - Detecting Keybord Key Press
15:43 - EUREKA!
16:46 - Outro
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Видео How CPUs Access Hardware - Another SerenityOS Exploit канала LiveOverflow
Previous SerenityOS videos:
https://www.youtube.com/watch?v=qUh507Na9nk
https://www.youtube.com/watch?v=oIAP1_NrSbY
Linus' wisdom2 exploit: https://github.com/allesctf/writeups/blob/master/2020/hxpctf/wisdom2/writeup.md
SerenityOS hacking: https://www.youtube.com/watch?v=DhVZ7vO69DI&list=PLMOpZvQB55bcRA5-KjvW7dVyGUarcqZuL
Vulnerable SerenityOS version: https://github.com/SerenityOS/serenity/tree/5505159a94c226d0c8a5e82a163a6d37a9404c57
Binary Exploitation Playlist: https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN
Hardware Wallet Research: https://www.youtube.com/watch?v=nNBktKw9Is4&list=PLhixgUqwRTjyLgF4x-ZLVFL-CRTCrUo03
00:00 - Intro
00:47 - Accumulating Knowledge Over Years
01:14 - The Plan For This Video
02:00 - Computers are Simple!
02:40 - Computers are Hard!
03:39 - What I Already Know About Kernels
04:58 - Missing Link Between Hardware and Software
06:00 - Andreas Summarizes Another SerenityOS Exploit
08:18 - What Are CPU EFLAGS?
11:02 - What Are IO Ports?
12:03 - Playing With EFLAGS
13:06 - Talking To Hardware via IO Ports
13:45 - Arduino Hardware Example - OUT Instruction
14:45 - Access Harddisk Controller With Ports
15:15 - Detecting Keybord Key Press
15:43 - EUREKA!
16:46 - Outro
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Видео How CPUs Access Hardware - Another SerenityOS Exploit канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
How Hacking Actually Looks Like - ALLES! CTF Team in Real TimeFormat String Exploit Troubleshooting Over Twitter - bin 0x11 bThe Art of Code - Dylan BeattieKernel Root Exploit via a ptrace() and execve() Race ConditionCoding Adventure: Chess AIXSS on the Wrong Domain T_T - Tech Support (web) Google CTF 2020In-depth: ELF - The Extensible & Linkable FormatHow Machine Language WorksSTOP WASTING YOUR TIME AND LEARN MORE HACKING!MALWARE ANALYSIS - VBScript Decoding & DeobfuscatingBasic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018Why MissingNo Multiplies Items!Reading Kernel Source Code - Analysis of an ExploitGabriel's Horn Paradox - NumberphileFPGA simulated on a GPU - GPURTL Google CTF Finals 2019 (reversing)What is a File Format?YouTubers have to declare ads. Why doesn't anyone else?TryHackMe! Skynet - Wildcard InjectionHow Do Linux Kernel Drivers Work? - Learning ResourceHow Docker Works - Intro to Namespaces