Reinventing Web Security
20:37
Жыл бұрын
Hacker Tweets Explained
13:47
Жыл бұрын
Zenbleed (CVE-2023-20593)
26:46
Жыл бұрын
Android App Bug Bounty Secrets
20:14
Hacking Google Cloud?
21:59
Жыл бұрын
Trying to Find a Bug in WordPress
18:07
Defending LLM - Prompt Injection
17:12
Attacking LLM - Prompt Injection
13:23
Cybercrime is Not Hacking!
11:16
Жыл бұрын
Attacking Language Server JSON RPC
16:31
Velocity Exploit on Paper?
14:18
Жыл бұрын
Computer Networking (Deepdive)
14:52
Пікірлер
@oKFutureOk
@oKFutureOk 5 сағат бұрын
Who can decode this public key to extract private key 1btc 1BDvQZjaAJH4ecZ8aL3fYgTi7rnn3o2thE Pubkey 04ea0d6650c8305f1213a89c65fc8f4343a5dac8e985c869e51d3aa02879b57c60cff49fcb99314d02dfc612d654e4333150ef61fa569c1c66415602cae387baf7
@prathameshgawade536
@prathameshgawade536 2 күн бұрын
I absolutely love you. What a method man.
@ismailkerouata3948
@ismailkerouata3948 3 күн бұрын
Hovered over ROP tutorials for 1hour then remembered LiveOverflow exists. Best explanation. A pwning gold mine
@iAmhATTER
@iAmhATTER 3 күн бұрын
@LiveOverflow Hextree should have a built-in compiler on the site for each user to use in each class. I guess I mean it should include the needed tools to do the class in the browser.
@dreadserpant
@dreadserpant 5 күн бұрын
Another example of client-server/IPC technology could be Pipestream.
@rida_brahim
@rida_brahim 5 күн бұрын
your channel is just amazing.
@olegkapustkin3568
@olegkapustkin3568 6 күн бұрын
Hi, thanks for the video. I‘m getting into reverse engineering and find it really fastinating. Could you tell me are there any job oportunity in this area other then pentesting/security.
@ONEGOALONEJOURNEY
@ONEGOALONEJOURNEY 8 күн бұрын
i still cant figure out why using service option followed by "AAA " it writes into heap?
@HughTube-t6l
@HughTube-t6l 8 күн бұрын
Chat gpt wasn't able to make a good programmed table trainer fpr you kids. It kept to kg between a class and a def. Even the newest ChatGPT.
@otur1
@otur1 9 күн бұрын
Using sudo can make a breach traceable as in which account was hacked. Disabling sudo in Linux is just as dumb as disabling UAC in Windows.
@NinjaMacGyver
@NinjaMacGyver 10 күн бұрын
After I fought Mewtwo that's I did mission glitch and got infinite Mewtwo
@drcyb3r
@drcyb3r 11 күн бұрын
There are also CTFs that are downloadable VMs for VMware. This VM then runs services or has open ports you need to get into. Sometimes they allow for different ways of intrusion. Our assignment during job training was to find one (or more) ways and describe them in detail in a document. It was a lot of fun and my team found 3 ways to get into one (with only 2 officially documented on the website). Sadly I never tried it again after taht as I didn't have the time to do so.
@drcyb3r
@drcyb3r 11 күн бұрын
I did a few CTFs during my job training time in IT. It's not very common but one of the teachers had this idea and it was very fun and interesting.
@discordiangod
@discordiangod 11 күн бұрын
Chatgpt is actually why I got back in cybersec; Idk if Ill ever get a job in it but f it man, Im back
@jimoberhansli7782
@jimoberhansli7782 11 күн бұрын
I hate hackers.
@SyedMSawaid
@SyedMSawaid 12 күн бұрын
Went to my first hackerspace. And damn, it was awesome.
@noyanogeday
@noyanogeday 12 күн бұрын
Hello, can we find the license key of an exe file with HWID protection?
@yohanespradono5224
@yohanespradono5224 13 күн бұрын
i really wanted to crack a program because there's no crack available on internet so I learned reverse engineering in 2 days and successfully cracked a program 😂
@mstckz1
@mstckz1 2 күн бұрын
Where did u learn it?
@geragera5342
@geragera5342 13 күн бұрын
The program that used to pay for bugs on 100 million download apps is not active anymore
@shunsuke7950
@shunsuke7950 13 күн бұрын
It seems like memory address is not mapped when in my file when i run the gdb. So ghidra address couldnt be breakpointed. What to do?
@DonatStratos
@DonatStratos 14 күн бұрын
Great content, as always! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?
@ShaquilleMagnusson
@ShaquilleMagnusson 14 күн бұрын
Thanks for the forecast! I have a quick question: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
@DonnieDeponte
@DonnieDeponte 14 күн бұрын
Appreciate the detailed breakdown! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
@88spaces
@88spaces 14 күн бұрын
Fantastic! I'm just starting the same exercise. So exciting!
@beaconoid
@beaconoid 15 күн бұрын
make a vid on how to do it or link one
@g4stLL
@g4stLL 16 күн бұрын
I'm deep into security now with a lot of experience, this seems fun but also like a another insane rabbit hole for me to follow XD, also I have an Iphone now and lost my android, so that's even one more layer to the challenge!
@killingtime9283
@killingtime9283 17 күн бұрын
Really interesting 🙂
@Null-c7i
@Null-c7i 17 күн бұрын
I'm currently creating a custom file type for my company, nearly finished it. Where I don't disagree entirely I would say a better way to look at it is a file type is designed and the tools or libraries that interact with it are coded with an understanding the designed structure. The file type is a concept and needs code to create it or read it, it technically doesn't exist beyond the concept of the structure. In simplest terms it's a structure in which data is stored.
@frenches1995
@frenches1995 17 күн бұрын
Finally a video where I simply understood everything. It's not the first one but it's a while ago when I just understood everything in one of your videos. Schönen Tag noch!
@logicisthejuice3240
@logicisthejuice3240 17 күн бұрын
Incredibly helpful! Currently, studying for a CompTIA cert. This creates a perfect mental framework so that I can see the abstract concepts clearly. Thanks!
@justcurious1940
@justcurious1940 19 күн бұрын
Does the VPN client takes over the layers below the Network layer or the OS will still do it ?.
@lunte0198
@lunte0198 19 күн бұрын
How "reverse engineering" works in js: >open file >read it
@saravananarumugam5872
@saravananarumugam5872 20 күн бұрын
For me in x86. Oracle virtual box vm. The python code. b"xCC" *4 is not working properly Can some one know the reason
@moroccan_pentester
@moroccan_pentester 20 күн бұрын
video after video I get more addicted to this channel
@AlbySilly
@AlbySilly 21 күн бұрын
I've been staring at packets for what feels like weeks by now, I just can't make sense of what I'm seeing. I can see about 4 or 5 unique package headers (or twice, depending on how you count) I understand that there's a timer, 2 bytes for milliseconds, and maybe another one using 4 bytes, though I'm not sure since the data is ever changing for those packets But the data itself doesn't yet make sense, there are rare occurrences where one of the package types contains plaintext so it can't be encrypted right? But there doesn't seem to be many patterns to decode the packets outside of the things I've mentioned so far...
@redrekon
@redrekon 23 күн бұрын
I never knew under the hood this much happing 😮😮
@humphreeyy
@humphreeyy 23 күн бұрын
Next step is sqp injection
@BZ-nb2rh
@BZ-nb2rh 24 күн бұрын
how do you even download cheatengine, even without antivirus enabled?
@nitsanbh
@nitsanbh 24 күн бұрын
this is amazing
@labguy9492
@labguy9492 24 күн бұрын
hawk tuah
@labguy9492
@labguy9492 24 күн бұрын
🤣🤣🤣🤣🤣🤣🤣🤣🤣
@brunovarela10
@brunovarela10 24 күн бұрын
Its a nice tutorial bro, i using this video, watch guide hacking too, i dont have the best english, but its help me. thanks for videos.
@anand_bhasme
@anand_bhasme 25 күн бұрын
Student discount plan please?
@nullnull6032
@nullnull6032 25 күн бұрын
You ddi not explain anything at all. The whole point is in the race condition and why it happens.
@benjith17
@benjith17 26 күн бұрын
I don't like this video because it makes me feel incredibly stupid. All the people in this are so smart and are coming up with really cool tricks and exploits. Please make a second series
@jpphoton
@jpphoton 27 күн бұрын
my ninja - good stuff learned here.
@3xpl0i79
@3xpl0i79 28 күн бұрын
Hey liveoverflow, can you make a video on hunting for CVEs, your methodology and ideas?
@Hank-Random
@Hank-Random 28 күн бұрын
Boring, boring, boring🥱🥱🥱🥱
@noyanogeday
@noyanogeday 28 күн бұрын
How can we crack a HWID license controlled exe file?
@emblemi6345
@emblemi6345 22 күн бұрын
Study the GamersOsState patches maybe.
@endepointe
@endepointe 29 күн бұрын
The celebration was internal