Exploiting a Use-After-Free (UAF) Vulnerability - "Unsubscriptions Are Free" Pwn Challenge [PicoGym]

  Рет қаралды 8,938

CryptoCat

CryptoCat

Күн бұрын

Пікірлер: 31
@_CryptoCat
@_CryptoCat 2 жыл бұрын
write-up and solve script: github.com/Crypto-Cat/CTF/tree/main/ctf_events/pico_gym/pwn/unsubscriptions_are_free
@collinsinfosec
@collinsinfosec 2 жыл бұрын
Great work! Thank you, clear and concise explanation.
@_CryptoCat
@_CryptoCat 2 жыл бұрын
thanks mate 🙏🥰
@vaibhavsuri2389
@vaibhavsuri2389 Жыл бұрын
Great videos mate, can you please tell why you were setting the break point at the next instruction?
@_CryptoCat
@_CryptoCat Жыл бұрын
Thanks mate! Without reviewing the video, I'm guessing I just did this to quickly find out what the state of registers/memory was *after* the instruction was executed. I could also set a breakpoint on the instruction and then type "next" (or "n") but if you have to run the program a lot of times it can also get annoying xD
@AlmondForce
@AlmondForce 2 жыл бұрын
Your videos are always a pleasure to watch! Keep up the good work!
@_CryptoCat
@_CryptoCat 2 жыл бұрын
thanks mate 🙏🥰 you've been doing a great job as well! i respect the dedication and consistency 👊
@AlmondForce
@AlmondForce 2 жыл бұрын
@@_CryptoCat I appreciate you mate!
@MantisSTS
@MantisSTS 2 жыл бұрын
Another awesome video man! Keep it up
@_CryptoCat
@_CryptoCat 2 жыл бұрын
💜
@HopliteSecurity
@HopliteSecurity 2 жыл бұрын
This was amazing! Thanks again for the fantastic work and keep it up.
@_CryptoCat
@_CryptoCat 2 жыл бұрын
tyty 🥰
@user-oh4ye3uv6j
@user-oh4ye3uv6j Жыл бұрын
Hey I have a question, what if we write the leaked memory address to the m function where we are asked for a username and then the we call another function like s. Why doesn't that call the haha function ?
@_CryptoCat
@_CryptoCat Жыл бұрын
Sorry, it's been too long since I made this video 😂 I couldn't answer your question without reviewing the challenge, which I just don't have time for atm 😆
@coolestguy6757
@coolestguy6757 2 жыл бұрын
yeahhhh lets gooooo
@_CryptoCat
@_CryptoCat 2 жыл бұрын
👊
@Gaminislife123
@Gaminislife123 Жыл бұрын
I don't understand this. Surely after overwriting user by leaving a message, control would return back to doProcess() then back to main() which would run the printMenu(), processInput() loop again and you would somehow have to get back to the call to doProcess() without changing the value of user->whatToDo() from our modified value. Why does the program immediately jump to the address we insert in the leaveMessage function when doProcess has already called the address in user->whatToDo() to get into the leave message function. I'm confused.
@Gaminislife123
@Gaminislife123 Жыл бұрын
Just realised that processInput() doesn't set a value for user->WhatToDo when the leave message option is selected and instead just calls leaveMessage() directly and execution will then naturally pass into doProcess with the user modified value! 😀
@_CryptoCat
@_CryptoCat Жыл бұрын
@@Gaminislife123 I'm glad you worked it out because I would of had to re-watch the video 😂
@Gaminislife123
@Gaminislife123 Жыл бұрын
@@_CryptoCat Haha I was just having a moment. Thanks for all these videos and for helping us out! Really enjoying the binary exploitation series 👊
@user-oh4ye3uv6j
@user-oh4ye3uv6j Жыл бұрын
@@Gaminislife123 Wait why does it matter if execution is naturally paseds into doProcess with the user modified value ?
@danieldaszkiewicz6989
@danieldaszkiewicz6989 2 жыл бұрын
Hey great video man. I don't have much knowledge on the foundational skills used to solve these rooms. Specifically understanding of addresses, heaps and such. Can you recommend anything to learn the foundations?
@_CryptoCat
@_CryptoCat 2 жыл бұрын
Thanks mate, here's a list of all my favourite resources: github.com/Crypto-Cat/CTF#resources I did a couple of binary exploitation playlists as well and LiveOverflow + PinkDraconian + RazviOverflow have some good videos 😉
@razmjumehdi9069
@razmjumehdi9069 2 жыл бұрын
which OS best for redteam and penetration testing? Blackarch or Kali or Parrot?
@_CryptoCat
@_CryptoCat 2 жыл бұрын
I only have experience with Kali/Parrot and I think they are both perfectly good options for pen-testing. They come with most of the same tools, installation of new tools is similiar etc. A lot of people swear by Blackarch though!
@earthlyelder
@earthlyelder 2 жыл бұрын
First comment! Woo Hoo! Thanks again bro. Great stuff
@_CryptoCat
@_CryptoCat 2 жыл бұрын
🙏🥰
@samuelevalperta3865
@samuelevalperta3865 2 жыл бұрын
100% made by italian guy... talks about spaghetti in the description and EAX contains "c1a0" (hello in italian), nice easter eggs. Anyway amazing video by you.
@_CryptoCat
@_CryptoCat 2 жыл бұрын
Haha that's awesome, I definitely missed that! 💜
@deniszefi920
@deniszefi920 2 жыл бұрын
Exploit gobrrrrrr
@_CryptoCat
@_CryptoCat 2 жыл бұрын
😁
SEETF [Social Engineering Experts] 2022 - Challenge Walkthroughs
1:18:50
Why Video Game Graphics Degrade - And Who's to Blame?
15:12
Radical Cap
Рет қаралды 678 М.
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 31 МЛН
Арыстанның айқасы, Тәуіржанның шайқасы!
25:51
QosLike / ҚосЛайк / Косылайық
Рет қаралды 700 М.
My scorpion was taken away from me 😢
00:55
TyphoonFast 5
Рет қаралды 2,7 МЛН
Buffer Overflows: A Symphony of Exploitation
30:18
crow
Рет қаралды 78 М.
I Will Not Write Rust Again
7:19
ThePrimeTime
Рет қаралды 190 М.
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 226 М.
How This Woman Exposed Wall Street
33:23
fern
Рет қаралды 862 М.
Hacking Discord for $5000 Bounty
24:50
Mrgavyadha
Рет қаралды 81 М.