write-up and solve script: github.com/Crypto-Cat/CTF/tree/main/ctf_events/pico_gym/pwn/unsubscriptions_are_free
@collinsinfosec2 жыл бұрын
Great work! Thank you, clear and concise explanation.
@_CryptoCat2 жыл бұрын
thanks mate 🙏🥰
@vaibhavsuri2389 Жыл бұрын
Great videos mate, can you please tell why you were setting the break point at the next instruction?
@_CryptoCat Жыл бұрын
Thanks mate! Without reviewing the video, I'm guessing I just did this to quickly find out what the state of registers/memory was *after* the instruction was executed. I could also set a breakpoint on the instruction and then type "next" (or "n") but if you have to run the program a lot of times it can also get annoying xD
@AlmondForce2 жыл бұрын
Your videos are always a pleasure to watch! Keep up the good work!
@_CryptoCat2 жыл бұрын
thanks mate 🙏🥰 you've been doing a great job as well! i respect the dedication and consistency 👊
@AlmondForce2 жыл бұрын
@@_CryptoCat I appreciate you mate!
@MantisSTS2 жыл бұрын
Another awesome video man! Keep it up
@_CryptoCat2 жыл бұрын
💜
@HopliteSecurity2 жыл бұрын
This was amazing! Thanks again for the fantastic work and keep it up.
@_CryptoCat2 жыл бұрын
tyty 🥰
@user-oh4ye3uv6j Жыл бұрын
Hey I have a question, what if we write the leaked memory address to the m function where we are asked for a username and then the we call another function like s. Why doesn't that call the haha function ?
@_CryptoCat Жыл бұрын
Sorry, it's been too long since I made this video 😂 I couldn't answer your question without reviewing the challenge, which I just don't have time for atm 😆
@coolestguy67572 жыл бұрын
yeahhhh lets gooooo
@_CryptoCat2 жыл бұрын
👊
@Gaminislife123 Жыл бұрын
I don't understand this. Surely after overwriting user by leaving a message, control would return back to doProcess() then back to main() which would run the printMenu(), processInput() loop again and you would somehow have to get back to the call to doProcess() without changing the value of user->whatToDo() from our modified value. Why does the program immediately jump to the address we insert in the leaveMessage function when doProcess has already called the address in user->whatToDo() to get into the leave message function. I'm confused.
@Gaminislife123 Жыл бұрын
Just realised that processInput() doesn't set a value for user->WhatToDo when the leave message option is selected and instead just calls leaveMessage() directly and execution will then naturally pass into doProcess with the user modified value! 😀
@_CryptoCat Жыл бұрын
@@Gaminislife123 I'm glad you worked it out because I would of had to re-watch the video 😂
@Gaminislife123 Жыл бұрын
@@_CryptoCat Haha I was just having a moment. Thanks for all these videos and for helping us out! Really enjoying the binary exploitation series 👊
@user-oh4ye3uv6j Жыл бұрын
@@Gaminislife123 Wait why does it matter if execution is naturally paseds into doProcess with the user modified value ?
@danieldaszkiewicz69892 жыл бұрын
Hey great video man. I don't have much knowledge on the foundational skills used to solve these rooms. Specifically understanding of addresses, heaps and such. Can you recommend anything to learn the foundations?
@_CryptoCat2 жыл бұрын
Thanks mate, here's a list of all my favourite resources: github.com/Crypto-Cat/CTF#resources I did a couple of binary exploitation playlists as well and LiveOverflow + PinkDraconian + RazviOverflow have some good videos 😉
@razmjumehdi90692 жыл бұрын
which OS best for redteam and penetration testing? Blackarch or Kali or Parrot?
@_CryptoCat2 жыл бұрын
I only have experience with Kali/Parrot and I think they are both perfectly good options for pen-testing. They come with most of the same tools, installation of new tools is similiar etc. A lot of people swear by Blackarch though!
@earthlyelder2 жыл бұрын
First comment! Woo Hoo! Thanks again bro. Great stuff
@_CryptoCat2 жыл бұрын
🙏🥰
@samuelevalperta38652 жыл бұрын
100% made by italian guy... talks about spaghetti in the description and EAX contains "c1a0" (hello in italian), nice easter eggs. Anyway amazing video by you.