Format String Exploit Troubleshooting Over Twitter - bin 0x11 b
Helping somebody with a simple format string exploit via twitter. Getting stuck with problems is one of the most frustrating but best ways to learn. That's why I like to help people figure out their own issues, rather than just telling them.
https://exploit.education/protostar/
Binary Exploitation Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN
Voice Actor John Hammond: https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw
00:00 Intro
00:59 Question via Twitter DM
02:16 My Initial Thoughts and Analysis
03:20 Format String Recap
04:30 Analyzing The Broken Script
05:39 "Where is the flag?" What is the challenge goal?
06:20 Question 1: What does %s do?
07:16 Question 2: What is the difference between %x and %s?
08:07 GO WATCH MY OLD VIDEOS!
08:28 Question 3: Does %s print strings from the stack?
09:09 Binary Exploitation Episode 0x1E & Google Solutions
10:45 Question 4 Going Back to Basics!
12:05 Question 5: How to print actual stack values?
13:05 Miscommunication via Text Messages
13:45 Wrong Challenge Assumptions
14:33 Miscommunication Again
15:35 Testing %x
15:56 Recognizing ASCII in hexdump
17:10 Typical Format String Exploit Issues
17:59 Running Into More Weird Bugs
20:23 Debugging The Script
21:45 Almost Solved It!
22:45 Found the Flag!
23:20 Ooops! They Had Solved It Earlier
23:34 Conclusion: Helping People Takes Time
24:15 Is This a Good Video?
24:39 Outro
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Видео Format String Exploit Troubleshooting Over Twitter - bin 0x11 b канала LiveOverflow
https://exploit.education/protostar/
Binary Exploitation Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN
Voice Actor John Hammond: https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw
00:00 Intro
00:59 Question via Twitter DM
02:16 My Initial Thoughts and Analysis
03:20 Format String Recap
04:30 Analyzing The Broken Script
05:39 "Where is the flag?" What is the challenge goal?
06:20 Question 1: What does %s do?
07:16 Question 2: What is the difference between %x and %s?
08:07 GO WATCH MY OLD VIDEOS!
08:28 Question 3: Does %s print strings from the stack?
09:09 Binary Exploitation Episode 0x1E & Google Solutions
10:45 Question 4 Going Back to Basics!
12:05 Question 5: How to print actual stack values?
13:05 Miscommunication via Text Messages
13:45 Wrong Challenge Assumptions
14:33 Miscommunication Again
15:35 Testing %x
15:56 Recognizing ASCII in hexdump
17:10 Typical Format String Exploit Issues
17:59 Running Into More Weird Bugs
20:23 Debugging The Script
21:45 Almost Solved It!
22:45 Found the Flag!
23:20 Ooops! They Had Solved It Earlier
23:34 Conclusion: Helping People Takes Time
24:15 Is This a Good Video?
24:39 Outro
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Видео Format String Exploit Troubleshooting Over Twitter - bin 0x11 b канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Google Paid Me to Talk About a Security Issue!Why π^π^π^π could be an integer (for all we know!).Some thoughts on Mobile App Security - is it FUD?MALWARE ANALYSIS - VBScript Decoding & DeobfuscatingSo how does a PS/2 keyboard interface work?Nintendo Hire me!!!!!!!!Why Progress Bars Don't Move Smoothly ▓▓▓░░░░░░Endianness Explained With an Egg - ComputerphileResearching MissingNo Glitch in PokemonTop 10 Craziest Assembly Language InstructionsHow Do Linux Kernel Drivers Work? - Learning ResourceCritical .zip vulnerabilities? - Zip Slip and ZipperDownA simple Format String exploit example - bin 0x11How CPUs Access Hardware - Another SerenityOS ExploitOpen Source 8.5 Digit Voltmeter from CERN: Build and TestNintendo Switch (NVIDIA Tegra X1) - BootROM VulnerabilityChaining Script Gadgets to Full XSS - All The Little Things 2/2 (web) Google CTF 2020Seatbelt | How does it work?How Docker Works - Intro to NamespacesAnalysing a Firefox Malware browserassist.dll - FLARE-On 2018