Hack The Box - Introduction to Binary Exploitation - Jeeves - [Walkthrough]
▶️ YouTube: https://www.youtube.com/c/PinkDraconian
🎁 Patreon: https://www.patreon.com/PinkDraconian
🐦 Twitter: https://twitter.com/PinkDraconian
🎵 TikTok: https://www.tiktok.com/@pinkdraconian
ℹ️ LinkedIn: https://www.linkedin.com/in/robbe-van-roey-365666195/
📞 Discord: PinkDraconian#9907
📷 Instagram: https://www.instagram.com/robbevanroey/
🕸️ Website: http://pinkdraconian.d4rkc0de.com/
👨💻 HackTheBox: https://www.hackthebox.eu/home/users/profile/129531
🤖 Reddit: https://www.reddit.com/user/PinkDraconian
☁️ Steam: https://steamcommunity.com/id/PinkDraconian
🐈 GitHub: https://github.com/PinkDraconian
CTF: HackTheBox
Link: https://www.hackthebox.eu/
Category: Pwn
Challenge name: Jeeves
Difficulty: 1/10
00:00 Introduction
00:25 Checking out the binary
00:40 Using Ghidra
01:20 Running the binary
01:40 Checking out what we want and where our input goes
02:00 Uses gets for input, we have buffer overflow
02:30 Explaining segmentation fault and when it happens
03:10 Explaining the stack and how it grows
05:00 Counting how many bytes we need to overwrite to get to the wanted variable
07:30 Checking our calculations in IDA
08:15 Creating our input with pwntools
11:15 Executing on the server
Видео Hack The Box - Introduction to Binary Exploitation - Jeeves - [Walkthrough] канала PinkDraconian
🎁 Patreon: https://www.patreon.com/PinkDraconian
🐦 Twitter: https://twitter.com/PinkDraconian
🎵 TikTok: https://www.tiktok.com/@pinkdraconian
ℹ️ LinkedIn: https://www.linkedin.com/in/robbe-van-roey-365666195/
📞 Discord: PinkDraconian#9907
📷 Instagram: https://www.instagram.com/robbevanroey/
🕸️ Website: http://pinkdraconian.d4rkc0de.com/
👨💻 HackTheBox: https://www.hackthebox.eu/home/users/profile/129531
🤖 Reddit: https://www.reddit.com/user/PinkDraconian
☁️ Steam: https://steamcommunity.com/id/PinkDraconian
🐈 GitHub: https://github.com/PinkDraconian
CTF: HackTheBox
Link: https://www.hackthebox.eu/
Category: Pwn
Challenge name: Jeeves
Difficulty: 1/10
00:00 Introduction
00:25 Checking out the binary
00:40 Using Ghidra
01:20 Running the binary
01:40 Checking out what we want and where our input goes
02:00 Uses gets for input, we have buffer overflow
02:30 Explaining segmentation fault and when it happens
03:10 Explaining the stack and how it grows
05:00 Counting how many bytes we need to overwrite to get to the wanted variable
07:30 Checking our calculations in IDA
08:15 Creating our input with pwntools
11:15 Executing on the server
Видео Hack The Box - Introduction to Binary Exploitation - Jeeves - [Walkthrough] канала PinkDraconian
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Hack The Box - Introduction to Binary Exploitation - BatComputer - [Walkthrough]](https://i.ytimg.com/vi/3Snd6A_duSQ/default.jpg)
![Pwntools ROP Binary Exploitation - DownUnderCTF](https://i.ytimg.com/vi/i5-cWI_HV8o/default.jpg)
![First Exploit! Buffer Overflow with Shellcode - bin 0x0E](https://i.ytimg.com/vi/HSlhY4Uy8SA/default.jpg)
![Hacking CARS with an Oscilloscope!!! | Hack The Box Challenges Unique | Saleae Logic 2](https://i.ytimg.com/vi/EtHGtM9CJeI/default.jpg)
![Hack The Box - Introduction to Binary Exploitation - Optimistic - [Walkthrough]](https://i.ytimg.com/vi/MVeRz2ZdSdk/default.jpg)
![Developing an intuition for binary exploitation - bin 0x20](https://i.ytimg.com/vi/akCce7vSSfw/default.jpg)
![SunshineCTF 2019 | Return to Mania (PWN) PIE](https://i.ytimg.com/vi/WNh3tFysYXY/default.jpg)
![Name Server [Tamil CTF] - Binary Exploitation (Pwn) Walkthrough](https://i.ytimg.com/vi/Q5Xx3aM0cUE/default.jpg)
![HTB Secure Digital](https://i.ytimg.com/vi/IIqNLygpoxU/default.jpg)
![How to exploit a buffer overflow vulnerability - Practical](https://i.ytimg.com/vi/hJ8IwyhqzD4/default.jpg)
![HackTheBox - Compromised](https://i.ytimg.com/vi/yaV09XCDDqI/default.jpg)
![HeapLab Taster: GLIBC Heap Exploitation by Max Kamper](https://i.ytimg.com/vi/s-GJ-buCGio/default.jpg)
![Google CTF - BEGINNER Reverse Engineering w/ ANGR](https://i.ytimg.com/vi/RCgEIBfnTEI/default.jpg)
![Hack The Box - Introduction to Binary Exploitation - PwnShop - Stack Pivot, Ret2LIBC [Walkthrough]](https://i.ytimg.com/vi/i_5VQF18suQ/default.jpg)
![Binary Exploitation Deep Dive: Return to LIBC (with Matt)](https://i.ytimg.com/vi/tMN5N5oid2c/default.jpg)
![Hack The Box - Introduction to Binary Exploitation - Reg - [Walkthrough]](https://i.ytimg.com/vi/72GShSHsRZI/default.jpg)
![x64 Linux Binary Exploitation Training](https://i.ytimg.com/vi/gxU3e7GbC-M/default.jpg)
![How to build your Pwnagotchi for WiFi hacking (Pwn all the wifi) in a few easy steps today (Part1)](https://i.ytimg.com/vi/i-Txv8VVg3E/default.jpg)
![Nightmare [easy] - HackTheBox Pwn Challenge](https://i.ytimg.com/vi/U42Yz97gmQc/default.jpg)
![TryHackMe - Kenobi Walkthrough](https://i.ytimg.com/vi/Qnrj9VaxxDs/default.jpg)