Global variable Buffer Overflow to leak memory - 34C3 CTF readme_revenge (pwn)

  Рет қаралды 85,848

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 103
@SentientSeven
@SentientSeven 6 жыл бұрын
This has quickly turned into one of my favorite channels, my only regret is not discovering you sooner!
@sagarkapasi099
@sagarkapasi099 6 жыл бұрын
same
@X3eRo0
@X3eRo0 6 жыл бұрын
Didn't understand anything but still enjoyed hoping that someday I will also learn it
@mortenschantz3811
@mortenschantz3811 6 жыл бұрын
Same :)
@X3eRo0
@X3eRo0 6 жыл бұрын
Morten Schantz we have to do something. I can't live like that I need to learn this. Even Liveoverflow channel has a binary exploitation series that goes over my head I need to restart. Anyone has any good resources to start with
@007order007
@007order007 6 жыл бұрын
You need to do it, try the exploit exercises vms; practical knowledge is the best way to truly grasp it
@pwn0x80
@pwn0x80 6 жыл бұрын
Pulkit Singhania indian!!??
@X3eRo0
@X3eRo0 6 жыл бұрын
RoCk StAr DeViL yeah
@SuperBotcreator
@SuperBotcreator 6 жыл бұрын
All the drawings and indicators combined with the quality of the microphone and video actually makes this way more helpful to understand your points (opposed to other creators). +1 to everything
@mr2amethyst
@mr2amethyst 5 жыл бұрын
is this fucking faggocheat sphenix
@Alex-kh8zj
@Alex-kh8zj 3 жыл бұрын
@@mr2amethyst ?
@rwpage89
@rwpage89 6 жыл бұрын
Dude you are absolutely fantastic. It’s one thing to have the experience and knowledge, it’s a totally different skill to be able to teach the thought process and logic. I wish you had more subs, your content gold
@procrast
@procrast 6 жыл бұрын
exactly
@renakunisaki
@renakunisaki 5 жыл бұрын
Here my mind is blown just at the fact that you can register custom printf handlers.
@DemonixTB
@DemonixTB 4 жыл бұрын
i watched this when it came out, back whenever i started high school, didn't understand any of it, now Im at least able to follow, a good sign of improvement :D
@ltstaffel5323
@ltstaffel5323 6 жыл бұрын
Really liked this. First video of yours that I watched and was able to understand everything you did before your extra explanations
@__mk_km__
@__mk_km__ 6 жыл бұрын
The best thing about those challenges is multiple solutions. Having the power of re-writing unlimited amount of memory you can just do whatever
@pacsmile
@pacsmile 5 жыл бұрын
I wish i understood anything you talk about, still so entertaining to watch yout videos.
@pandavova
@pandavova 6 жыл бұрын
Mir gefallen echt deine Videos. Mal hoffen das es viele weiter geben wird :D
@m0mosenpai
@m0mosenpai 6 жыл бұрын
Really amazing video man! I admit i didn't understand most of it but hope to work my way towards that level of understanding. I would also love to see more in depth tutorials and advice for beginners ! :D
@infosecaphorisms5479
@infosecaphorisms5479 6 жыл бұрын
As a beginner what kind of tutorials and materials would be useful to you?
@movAX13h
@movAX13h 6 жыл бұрын
Awesome channel! It gets better with every new video! Danke
@LiveOverflow
@LiveOverflow 6 жыл бұрын
thanks for saying that! I was worried to disappoint a lot of the new subscribers that came because of the less technical videos.
@daab889
@daab889 6 жыл бұрын
easy-ish?
@oldbootz
@oldbootz 6 жыл бұрын
hahahahaha yes this is fucking next level for my memory editing skills
@MegaStupidMonkeys
@MegaStupidMonkeys 5 жыл бұрын
compared to some other challenges, yes this is relatively very easy and doesn't really require a team to solve it.
@DanteElMc
@DanteElMc 4 жыл бұрын
Easy'nt
@---br3hp
@---br3hp 5 жыл бұрын
every vid of yours is awesome!I will keep studying , and it's hard for me I feel
@anishamdi4405
@anishamdi4405 6 жыл бұрын
Awesome as always
@stancuflorin
@stancuflorin 6 жыл бұрын
Love your videos man,keep it up!
@DevDungeon
@DevDungeon 6 жыл бұрын
Great job explaining things!
@cervi6538
@cervi6538 6 жыл бұрын
You are the best!
@slindnertube
@slindnertube 6 жыл бұрын
Hi... thanks for the video. I totally get what you did there. Just as an exercise I still wanted to get a full shell. You easily control the instruction pointer here, but the arguments are a problem. Anyone interested in trying this as well?
@lukaszstocki6998
@lukaszstocki6998 6 жыл бұрын
blew my mind!
@Dr.A.P.
@Dr.A.P. 6 жыл бұрын
can you do a video where you introduce all the tools you use in your videos?
@meksaldi
@meksaldi 6 жыл бұрын
There is already a video of what you are asking I think.
@__mk_km__
@__mk_km__ 6 жыл бұрын
The binary exploitation playlist on his channel, first or second video
@kirdow
@kirdow 6 жыл бұрын
Notification Squad woo :D Edit: Great video as usual
@TheSkepticSkwerl
@TheSkepticSkwerl 6 жыл бұрын
I'm wondering if using crunch and xargs could fuzz it. And once you find the length to buffer overflow, you then try to change the return to every value. And then grep 34c3 to get the flag. It wouldn't explain how it works like you're video. But it would fuzz out an answer
@WoolieOG
@WoolieOG 6 жыл бұрын
great vid =)
@Napert
@Napert 6 жыл бұрын
why whenever you do a buffer overflow with "AAAAAAAAAAAAAAAAAAAAAAA" i start screaming "AAAAAAAAAAAAAAAAAAA"?
@centdemeern1
@centdemeern1 6 жыл бұрын
it overflowed into your voice jk lol
@Ketchup911
@Ketchup911 4 жыл бұрын
This was crazy
@agustinothadeus
@agustinothadeus 6 жыл бұрын
Pretty straightforward huh!!, well not to me it wasn't, nice video though. I hope one day I might learn to do the same
@StefanGliga48
@StefanGliga48 6 жыл бұрын
Revenge is so sweet.
@Zooiest
@Zooiest 5 жыл бұрын
Aww that self-confidence at the end is so cute. I’m the opposite, I’ll never reach your level
@ifconfigurator
@ifconfigurator 6 жыл бұрын
Why did you need to smash the stack? Wouldn't simply returning the flag's address from printf's new %s function work to cause it to be printed?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
I didn’t smash the stack here. I executed the stack smash printing error by hand, which is the new %s function, which causes the flag to be printed ;)
@robindimyanoglu4369
@robindimyanoglu4369 6 жыл бұрын
nice trick you've done there with __stack_chk_fail! was the nx enabled? if not, couldn't you redirect execution flow to an egg-hunter-ish shellcode?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
NX is basicallly always enabled ;)
@omrikurtz5981
@omrikurtz5981 6 жыл бұрын
Hm, at 3:52 you said you can access local vars on the stack using rsp+0xsomething, didn't you mean rbp? I mean stack pointer is just the top of the stack, and rbp is the base pointer, which is saved in the prologue for this purpose.
@kotkiorketer
@kotkiorketer 6 жыл бұрын
Big FACEPALM that scanf("%s") reads null bytes and I thought only gets is so stupid :D
@ИльяАпролов
@ИльяАпролов 6 жыл бұрын
gj man
@klikkolee
@klikkolee 4 жыл бұрын
I'm so amused that a function related to detecting buffer overflow is used as a gadget when performing a buffer overflow exploit.
@nieder-olm
@nieder-olm 4 жыл бұрын
Wow I didn’t understand a word and I have a BSc in CS. Feelsbadman
@viraatchandra8498
@viraatchandra8498 6 жыл бұрын
genius :)
@StefanSchlott
@StefanSchlott 6 жыл бұрын
This means that stack_chk_fail does not use printf for its output (or at least not %s for displaying the program name)?
@inferno3853
@inferno3853 5 жыл бұрын
Late reply but from what I understand that wouldn't matter in this case. He overwrote the printf function table to execute the stack_chk_fail function (which is always present) and as stack_chk_fail uses the command line argument 0 to print the path of the program, he overwrote the argv pointer address to point to memory he can modify. He then modified argv[0] to point to the flag and voila, stack_chk_fail prints the flag since it believes argv[0] is located at that address. Someone correct me if I'm wrong here.
@that_one_redfox
@that_one_redfox 5 жыл бұрын
Only lesson i learned in attempts to get some knowledge: I m useless in coding area.
@nikidino8
@nikidino8 6 жыл бұрын
I love the 1337
@gsniteesh3794
@gsniteesh3794 6 жыл бұрын
can you do a live Q&A session pls
@alsacchi
@alsacchi 6 жыл бұрын
I don't undestad the part when you use forma buffer the dumped memory
@mdsathees3747
@mdsathees3747 6 жыл бұрын
Could you tell some idea for improving assembly code
@jbess04
@jbess04 6 жыл бұрын
Satheeskumar Durai What I've heard helps is writing your own programs in C, then looking at the assembly of those programs to see how they work
@sundhaug92
@sundhaug92 6 жыл бұрын
A slight issue with going through C is that by default your compiler will add a whole lot of stuff
@Zooiest
@Zooiest 6 жыл бұрын
10:52 163rd*
@black_platypus
@black_platypus 5 жыл бұрын
🤔 Yees... what do we _chang_ ? :P
@kim15742
@kim15742 6 жыл бұрын
Wow
@justanormalperson
@justanormalperson 6 жыл бұрын
im seeing glitched text at 5:00?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
I changed my recording process a little bit and haven’t figure out to get rid of them yet. Sorry :(
@justanormalperson
@justanormalperson 6 жыл бұрын
i hate when something goes wrong :/
@wayneyahnke7099
@wayneyahnke7099 6 жыл бұрын
It's OK, it's not a big deal and flashes by so fast it doesn't really matter. Your content is of such great quality not because of the video you show but the words you use! Keep these great explanations coming =)
@ali-azizimayer-peters6686
@ali-azizimayer-peters6686 5 жыл бұрын
Every Video of you is f**in amazing and its a pleasure to watch them and learn more. There is no way to buy private lessons from you ? :D :D ...Joke... No your awesome dude, please don't stop making Videos i've learned already so much from your Videos that i am leaving my script-kiddie status step by step. Eventually i can work for the Bundeswehr in the "Cyber Abwehr"-program in a few years ?! Yeah im german too. That would be amazing. I've learned most of my binary hacking/disassembling skills from your channel, because your Videos are really full of good Information, so that i've learned in some Videos much more than in a 500-Page book. Keep going LiveOverflow your really a Person which does something very important for the people. Greetings Hotwire ;)
@mdsathees3747
@mdsathees3747 6 жыл бұрын
Can suggest some way to practice CTF flag game..
@infosecaphorisms5479
@infosecaphorisms5479 6 жыл бұрын
I would look into hackthebox.eu. They have an online lab for a wide range of skill levels. You can also look into lists like captf.com/practice-ctf/ for some CTF challenges.
@justanormalperson
@justanormalperson 6 жыл бұрын
nice :D
@luckyymvm
@luckyymvm 6 жыл бұрын
revenge pwn????
@candacepelley8093
@candacepelley8093 6 жыл бұрын
8:03 haaah
@benjaminnewman3833
@benjaminnewman3833 6 жыл бұрын
what was that calculator?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
default OSX calculator
@benjaminnewman3833
@benjaminnewman3833 6 жыл бұрын
ty
@martinp.4797
@martinp.4797 6 жыл бұрын
When ur blocked, u arrive to get out with new ideas, i don't know how ur doing. Me, I just stay stuck and give up.
@essamal-mansouri2689
@essamal-mansouri2689 6 жыл бұрын
This was ranked as "easy-ish"? What's easier than easy because that's what I need to find.
@codex4971
@codex4971 6 жыл бұрын
damn am too faar from this lvl fuaark
@pinkflamingointhehouse
@pinkflamingointhehouse 2 жыл бұрын
Watch me do this in C# 😂
@morte3252
@morte3252 6 жыл бұрын
Can C# be hacked?
@stewartzayat7526
@stewartzayat7526 6 жыл бұрын
Morte no it is immune
@hmm-.-
@hmm-.- 6 жыл бұрын
Stewart Zayat men, you made my day xD
@m8_981
@m8_981 6 жыл бұрын
Really wonder if Anyone here understands shit :D
@WoolieOG
@WoolieOG 6 жыл бұрын
i did understand most, cuz he explains his steps well, but im nowhere near attacking such challenges myself.
@digifomation
@digifomation 6 жыл бұрын
Wait a minute, Buffer Overflow are still relevant in 2018 ?
@meksaldi
@meksaldi 6 жыл бұрын
Some of the simplest bugs remain today still as the most dangerous ones. It has just become more difficult to discover them. This is due to the complexity of modern web & native applications.
@thescreemregular5168
@thescreemregular5168 4 жыл бұрын
F
@greob
@greob 6 жыл бұрын
Have you considered using dark background colours (and themes) instead of white backgrounds?
Hacker Tweets Explained
13:47
LiveOverflow
Рет қаралды 160 М.
СОБАКА ВЕРНУЛА ТАБАЛАПКИ😱#shorts
00:25
INNA SERG
Рет қаралды 3,6 МЛН
Ice Cream or Surprise Trip Around the World?
00:31
Hungry FAM
Рет қаралды 11 МЛН
The Singing Challenge #joker #Harriet Quinn
00:35
佐助与鸣人
Рет қаралды 33 МЛН
Analysing a Firefox Malware browserassist.dll - FLARE-On 2018
16:26
LiveOverflow
Рет қаралды 253 М.
How on Earth does ^.?$|^(..+?)\1+$ produce primes?
18:37
Stand-up Maths
Рет қаралды 383 М.
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
24:11
LiveOverflow
Рет қаралды 62 М.
CSAW'19 - PWN - Ret2libc w/ PWNTOOLS (baby_boi)
24:03
John Hammond
Рет қаралды 26 М.
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 116 М.
Characters, Symbols and the Unicode Miracle - Computerphile
9:37
Computerphile
Рет қаралды 2 МЛН
SunshineCTF 2019 | Return to Mania (PWN) PIE
16:07
John Hammond
Рет қаралды 25 М.
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
What is the Smallest Possible .EXE?
17:04
Inkbox
Рет қаралды 485 М.
СОБАКА ВЕРНУЛА ТАБАЛАПКИ😱#shorts
00:25
INNA SERG
Рет қаралды 3,6 МЛН