Global variable Buffer Overflow to leak memory - 34C3 CTF readme_revenge (pwn)
Two years ago I failed to solve the readme challenge at the 32c3ctf. Since then I have learned a lot and I got another chance!
readme 32c3ctf: https://www.youtube.com/watch?v=wLsckMfScOg
readme_revenge: https://archive.aachen.ccc.de/34c3ctf.ccc.ac/challenges/index.html
What is CTF? https://www.youtube.com/watch?v=8ev9ZX9J45A
Why you should play CTFs: https://www.youtube.com/watch?v=rfjV8XukxO8
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CTF #BinaryExploitation
Видео Global variable Buffer Overflow to leak memory - 34C3 CTF readme_revenge (pwn) канала LiveOverflow
readme 32c3ctf: https://www.youtube.com/watch?v=wLsckMfScOg
readme_revenge: https://archive.aachen.ccc.de/34c3ctf.ccc.ac/challenges/index.html
What is CTF? https://www.youtube.com/watch?v=8ev9ZX9J45A
Why you should play CTFs: https://www.youtube.com/watch?v=rfjV8XukxO8
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CTF #BinaryExploitation
Видео Global variable Buffer Overflow to leak memory - 34C3 CTF readme_revenge (pwn) канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Python code audit of a firmware update - 34C3 CTF software_update (crypto) part 1/2](https://i.ytimg.com/vi/Vgdhlh6evjI/default.jpg)
![Blind GQL injection and optimised binary search - A7 ~ Gee cue elle (misc) Google CTF 2017](https://i.ytimg.com/vi/za_9hrq-ZuA/default.jpg)
![Buffer Overflow Attack - Computerphile](https://i.ytimg.com/vi/1S0aBV-Waeo/default.jpg)
![Reverse engineering obfuscated JavaScript - PopUnder Chrome 59](https://i.ytimg.com/vi/8UqHCrGdxOM/default.jpg)
![Defeat 2FA token because of bad randomness - rhme2 Twistword (Misc 400)](https://i.ytimg.com/vi/RGknqvbhFCY/default.jpg)
![Abusing the exception handler to leak flag - 32C3CTF readme (pwnable 200)](https://i.ytimg.com/vi/wLsckMfScOg/default.jpg)
![Some thoughts on Mobile App Security - is it FUD?](https://i.ytimg.com/vi/PNuAzR_ZCbo/default.jpg)
![Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)](https://i.ytimg.com/vi/XuzuFUGuQv0/default.jpg)
![How Do Linux Kernel Drivers Work? - Learning Resource](https://i.ytimg.com/vi/juGNPLdjLH4/default.jpg)
![Custom Chromium Build to Reverse Engineer Pop-Under Trick](https://i.ytimg.com/vi/y6Uzinz3DRU/default.jpg)
![[Live] A basic Heap Feng Shui intro - 33c3ctf babyfengshui (pwn 150)](https://i.ytimg.com/vi/zWgS6fTw4Ts/default.jpg)
![Let’s play a game: what is the deadly bug here?](https://i.ytimg.com/vi/MpeaSNERwQA/default.jpg)
![Solving a JavaScript crackme: JS SAFE 2.0 (web) - Google CTF 2018](https://i.ytimg.com/vi/8yWUaqEcXr4/default.jpg)
![Searching for Bitcoins in GitHub repositories with Google BigQuery](https://i.ytimg.com/vi/Xml4Gx3huag/default.jpg)
![Linear independence and GF(2) - 34C3 CTF software_update (crypto) part 2/2](https://i.ytimg.com/vi/EOlddNofKxo/default.jpg)
![GitLab 11.4.7 Remote Code Execution - Real World CTF 2018](https://i.ytimg.com/vi/LrLJuyAdoAg/default.jpg)
![CSS Keylogger - old is new again](https://i.ytimg.com/vi/oJ6t7AImTdE/default.jpg)
![Nintendo Switch (NVIDIA Tegra X1) - BootROM Vulnerability](https://i.ytimg.com/vi/L3PPWVPg2WI/default.jpg)
![Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100)](https://i.ytimg.com/vi/FktI4qSjzaE/default.jpg)
![Reversing Input Validation (Keygen part 1) - Pwn Adventure 3](https://i.ytimg.com/vi/8ieAh19vrYc/default.jpg)