DANGEROUS C Functions gets & strcpy (PicoCTF 2022 #04 buffer-overflow0)

  Рет қаралды 37,481

John Hammond

John Hammond

Күн бұрын

Пікірлер: 47
@jlm1144
@jlm1144 2 жыл бұрын
I was at that part in my Security+ chapter about buffer-overflow and I was looking for an example of what it really did in C. Thanks man !! :)
@JB4lly
@JB4lly 2 жыл бұрын
Maybe putting -fstack-protector when compiling would have worked? Not sure
@wilcosec
@wilcosec 2 жыл бұрын
Great series! Keep it coming!
@mrnord1989
@mrnord1989 2 жыл бұрын
Thank you John, every time I watch one of your videos I always learn something new :)
@Rhyl4x
@Rhyl4x 2 жыл бұрын
These videos are so awesome. Thanks so much John
@KGAD0831
@KGAD0831 2 жыл бұрын
Loving this series, John. Please finish it!
@greyether777
@greyether777 2 жыл бұрын
Thanks John. We appreciate how you thoroughly explain everything and keep it simple at the same time. You're a rockstar!!
@zer001
@zer001 2 жыл бұрын
This was fun! Please more John. :)
@jpierce2l33t
@jpierce2l33t 2 жыл бұрын
Dude, following along right with you, even going ahead now until I get stuck! Please keep going, this is great and I appreciate you so much!
@wChris_
@wChris_ 2 жыл бұрын
it seems to be a kali linux thing having no stack-protector when building with gcc, as it works on my machine (ubuntu)
@FunkadelicFeed
@FunkadelicFeed 2 жыл бұрын
You have to pass “fstack-protector" when compiling with gcc
@VA3KAMA3
@VA3KAMA3 2 жыл бұрын
Super cool series, always a pleasure to watch them! Keep it up!
@kaleabalemayehu
@kaleabalemayehu 2 жыл бұрын
you already know it but let me tell you one more time YOU ARE AWESOME.
@logiciananimal
@logiciananimal 2 жыл бұрын
3 ways to fail the computer systems course I did ~20 years ago: 1) cheat 2) do way too little adequate work 3) use gets()
@windows74001
@windows74001 2 жыл бұрын
Haha I'm a noob at these CTF challenges and had troubles solving this one for some reason. Looking through it with your guidance I'm like "Wow I'm an idiot, it was so simple" lol
@LDowning0190
@LDowning0190 2 жыл бұрын
Enjoyed the video. Keep them coming.
@tuxmaster2715
@tuxmaster2715 Жыл бұрын
You the best John, thanks a lot for these material and your explanations, You are a master mind my friend
@masudrahman253
@masudrahman253 2 жыл бұрын
Done Watching Cool Thanks John
@sunriser_yt
@sunriser_yt 2 жыл бұрын
I wanted to subscribe, but I've completely forgotten that I already was. Anyway, thanks for another informative video!
@henrym5034
@henrym5034 2 жыл бұрын
Thank you for all the beginner-friendly content A question as an absolute newbie into binary: only an input of length>=20 causes the SIGSEGV, i.e. it doesn’t happen with say 17. Is there a way to know or estimate how many more bytes I need?
@hedgechasing
@hedgechasing 2 жыл бұрын
The segfault is triggered by overwriting the return address on the stack (changing its value to some random garbage makes the program try to jump to that address and read code from there which the OS does not allow and sends the segfault signal) how many bytes you need to modify depends on the layout of the stack. You can use a debugger and look at the addresses of the local variables or look at the disassembly to see how much space is being allocated on the stack, but in this particular case the extra four bytes are the space on the stack for the local variable input. The layout of the stack is return address, then input then the buffer (though the stack grows down so these end up at decreasing addresses). When you put an input less than 16 characters it fits into the buffer. If you put 16-19 characters it starts clobbering the local variable input, and only once you put in 20 or more characters does it start touching the return address and cause the segfault.
@henrym5034
@henrym5034 2 жыл бұрын
@@hedgechasing thanks for the explanation! I definitely have to look at it more
@MiguelDevOps
@MiguelDevOps 2 жыл бұрын
6:34 a minor correction: the char array buf1 is 100*sizeof(char) Bytes long
@cqundefine
@cqundefine 2 жыл бұрын
sigsegv stands for signal segmentation violation
@anmoldeepsingh9281
@anmoldeepsingh9281 Жыл бұрын
i think the stack smashing wasnt detected probably the way gcc was compiled, its default could have been -fno-stack-protector, so default build task will never include a canary
@drioko
@drioko 5 ай бұрын
Awesome
@TehPwnerer
@TehPwnerer 2 жыл бұрын
Oh the days I coded in C/C++, flush of output buffer is not guaranteed without the flush
@adilbougma3114
@adilbougma3114 Жыл бұрын
This is rust will dominated the c language 😂😂 but hey nice reverse engineer 😀 😉
@zer001
@zer001 2 жыл бұрын
I think strcpy is the most used function to demonstrate bufferoverflows.
@sorrefly
@sorrefly 2 жыл бұрын
09:00 laughs in format string vulnerability and return-to-libc
@frixx22
@frixx22 2 жыл бұрын
If this is training wheels, I am still at the crawling phase XD. I'll get there one day :')
@stopper0203
@stopper0203 Жыл бұрын
I don't understand how just adding a few extra characters causes the flag to magically appear. Is it because added the extra characters causes some specific code to execute? If so which part?
@fjr2go
@fjr2go 2 жыл бұрын
Nice'n'easy :)
@rsvv6828
@rsvv6828 2 жыл бұрын
What is the version of Sublime text you are using?? Please answer
@roachxyz
@roachxyz 2 жыл бұрын
Is overflow on this the same as overflow on Hacknet?
@krgrief
@krgrief 11 ай бұрын
you don’t explain how the buffer overflow even works though..?
@Pixailz
@Pixailz 2 жыл бұрын
Do you have references / explanation about the {,_COMPLETE}, i searched all day long on Shell expansion and no one say a thing about this tips :)
@iyousef46
@iyousef46 2 жыл бұрын
It's a bash feature called brace expansion.
@guilherme5094
@guilherme5094 2 жыл бұрын
👍
@BrAiNeeBug
@BrAiNeeBug 2 жыл бұрын
you made a 64bit version, so there more buffers i think.
@Angel-Pizzaeater
@Angel-Pizzaeater 2 жыл бұрын
@ethanrodrigo4060
@ethanrodrigo4060 2 жыл бұрын
How can this be dangerous?
@OmarHosam203
@OmarHosam203 2 жыл бұрын
2nd?
@alier3217
@alier3217 2 жыл бұрын
NVIDIA should be tried for unfair profit and hoarding...
@acidopcodes
@acidopcodes 2 жыл бұрын
I gave the 69th like 😁
@inquisitivemanipulator776
@inquisitivemanipulator776 2 жыл бұрын
1st?
PrintNightmare CVE (PicoCTF 2022 #06)
6:27
John Hammond
Рет қаралды 25 М.
From Small To Giant 0%🍫 VS 100%🍫 #katebrush #shorts #gummy
00:19
Can You Find Hulk's True Love? Real vs Fake Girlfriend Challenge | Roblox 3D
00:24
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
why do hackers love strings?
5:42
Low Level
Рет қаралды 426 М.
Buffer Overflow Hacking Tutorial (Bypass Passwords)
55:39
David Bombal
Рет қаралды 77 М.
Return Oriented Programming (PicoCTF 2022 #48 'ropfu')
35:09
John Hammond
Рет қаралды 22 М.
how do hackers exploit buffers that are too small?
8:25
Low Level
Рет қаралды 203 М.
First Exploit! Buffer Overflow with Shellcode - bin 0x0E
12:23
LiveOverflow
Рет қаралды 275 М.
how reverse engineering makes you a better programmer
13:12
Low Level
Рет қаралды 205 М.
From Small To Giant 0%🍫 VS 100%🍫 #katebrush #shorts #gummy
00:19