Pwntools & GDB for Buffer Overflow w/ Arguments (PicoCTF 2022 #43 'buffer-overflow2')

  Рет қаралды 43,266

John Hammond

John Hammond

2 жыл бұрын

(PS, jump into the HackTheBox Cyber Apocalypse CTF! j-h.io/htb-cyber-apocalypse2022)
Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
📗Humble Bundle ➡ j-h.io/humblebundle
🐶Snyk ➡ j-h.io/snyk
🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ j-h.io/ctf
🎤 Speaking Requests ➡ j-h.io/speaking
💥 Malware Submission ➡ j-h.io/malware
❓ Everything Else ➡ j-h.io/etc

Пікірлер: 40
@FurikuriYugi
@FurikuriYugi 2 жыл бұрын
Don't be sorry. It is important for people that are new to programing to see that despite how talented and or expierenced one is that we stil can get stumbled up on things even if it is a miss spelling that can eat away hours of your time. Great job as always and thank you.
@JohnSmith-eq5bw
@JohnSmith-eq5bw 2 жыл бұрын
I'm trying to get started in the infosec field after completing an unrelated undergraduate degree. It's fascinating stuff, but it's very easy to get discouraged. Seeing John encounter difficulties and work around them is inspirational. If a seasoned pro has a hard time with PicoCTF, that makes me feel a lot better about having a tough time applying the theory I'm learning.
@00killerix
@00killerix 2 жыл бұрын
For curiosity, what's degree have u done? :D
@Whyineedachannelname
@Whyineedachannelname 2 жыл бұрын
Thanks for all the work you do it's very educative can't wait to see the next one
@_hackwell
@_hackwell 2 жыл бұрын
thanks for the video! it'll help a lot for the upcoming cyber apocalypse
@artemis-arrow3098
@artemis-arrow3098 2 жыл бұрын
I'm currently learning exploit development, ur vids r rly helpful man, they give me a general idea for such things
@themadichib0d
@themadichib0d Жыл бұрын
Super cool, hadnt seen pwntools or gef before this, but I love how clean that exploit script looks once it was done.
@AntonioSouza
@AntonioSouza 2 жыл бұрын
Thank`s you John.
@taponplaza
@taponplaza Жыл бұрын
super informative video!!
@alisenjary
@alisenjary 2 жыл бұрын
Very nice
@FunkadelicFeed
@FunkadelicFeed Жыл бұрын
Seeing you struggle was so inspiring and encouraging. If you also have trouble sometimes then it's okay for me to struggle with almost all of the challenges 🤣
@thedailysenior
@thedailysenior Жыл бұрын
You the best!
@viv_2489
@viv_2489 2 жыл бұрын
Great python pwntool and gdb tutorial
@__hetz
@__hetz 2 жыл бұрын
I take a stab at Advent of Code every year, usually hitting the wall a bit over halfway through, and all I wanted last year was to make it on a leaderboard for the first time. I knew I'd have to do it with the easiest challenges in the first week, and it eventually happened to where I had "completed" a challenge fast enough that I would've finally made it. I was done and working in under two minutes... or I would have been except I had that same + instead of += typo on a line. It took me another 30 minutes of trying to find nonexistent bugs like index errors or off-by-ones before I realized the problem.... so maybe this year will be the year instead. As others have said don't beat yourself up over it because it happens to the best of us. At the same time showing these occasional struggles over simple oversights greatly humanizes the process. It reminds us that even professionals can tunnel vision themselves away from a solution that was firmly in their grasp. Keep up the awesome work, John!
@drewzilla1263
@drewzilla1263 Жыл бұрын
Nothing to be sorry about, John. The topic of these videos require a longer video. I love working along on these with you and I feel good when I figure things out around the same time you do, or at least I understand what you're talking about. It means I learned well form your videos so far. Thank you!
@_AN203
@_AN203 2 жыл бұрын
Pwn tools seems to be targeting walk throughs which is hell helpful !!
@spencerlaplaca437
@spencerlaplaca437 2 жыл бұрын
Huntington beach California here
@kostyatitovsky9983
@kostyatitovsky9983 2 жыл бұрын
Hello, John! Read about subparser for argparse ;)
@user-hd3pz2ow1b
@user-hd3pz2ow1b 3 ай бұрын
cool
@HAGSLAB
@HAGSLAB 2 жыл бұрын
I'm sure John knows this and is just using argparse manually to learn and teach. But, for anyone interested, `pwn template` actually gives you a template for your exploit including local/remote support.
@0xSebin
@0xSebin 2 жыл бұрын
John please do more videos related to Buffer overflow ...
@redspotaquashrimps
@redspotaquashrimps 2 жыл бұрын
Very cool! How many hours you spend per day doing this stuff before you know what you're doing from daily work to late night I suppose? :)
@KaliMax1337
@KaliMax1337 2 жыл бұрын
John, these are great vids- thanks! just starting out and really like rev eng but aside from CTF's , how is this an in demand skill for the real world?
@nekosalad8308
@nekosalad8308 Жыл бұрын
i think blue team seniors do rev eng. its not a junior level skill afaik.
@oliverthomas700
@oliverthomas700 Жыл бұрын
Hi John, thanks for another great video! I have a question about reading the value of ebp, when you have set it to cafef00d. I know the ebp+0x8 is cafec00d but when I do the "x $ebp+0x8" it prints " \360\376\312 \360\003". Why is that? 🙂
@samthelamb0718
@samthelamb0718 5 ай бұрын
dude i did pretty much the exact same thing, i dont understand that when i put the address of win it would jump there and anything following that would just get moved into the eip register preventing me from stepping through win.
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
Arg 1to transfer arg 2
@fs5784
@fs5784 3 ай бұрын
I don’t know Seth Rogan was in infosec
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
Integer value given? Integer over /underflow what tlime.
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
Part 2
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
Not 0?
@gothops154
@gothops154 2 жыл бұрын
44:58 armchair programming here, but (not x OR no y) is just (x AND y)
@_JohnHammond
@_JohnHammond 2 жыл бұрын
I might be stupid but I don't think that's true? IF ( NOT x OR NOT y) doesn't that mean either x could be 0 or y could be 0, the logic succeeds-- while with IF ( x AND y ), the logic only succeeds if both x is 1 and y is 1?
@intuital
@intuital 2 жыл бұрын
Actually, it's equal to NOT (x AND y). de Morgan's Theorem.
@v2nd2tt44
@v2nd2tt44 2 жыл бұрын
man still playing pico ctf 🕴..
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
Byipas
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
R vilu number what uuink k collections.
@databang
@databang 2 жыл бұрын
f̸̫̱̑̒͋͂͐͋̋̐̕u̶̼̻̦̥͔̍̈́͒̆͗̃̀͂͆̚z̶̨̨̢̛̲̰̯̹͍͚͕̒͑z̸̡̛͙̖͖y̵̪̜̞͇̜͕̏̅̈́͌̀̎̕L̶̢̛̫͉͓̙̏͛̓̈́̽o̴̪͈͓̮͐̋̐̇͒̑͊̊̕ģ̷̭͕̽͊̈́̋̀͛́ỉ̵̼̮̹̖̙̣̘͔̞͜c̵̙͙̍̈́̈́̄͆̌̆̈́͘F̶̦̈̆̏̊̈́̈́͘͝Ṭ̴̛͙̺̰̬͇̫̟̞̃̀̈́́̚̚͝W̶̬̺͓̯͕̿̒
@iskitcha5153
@iskitcha5153 2 жыл бұрын
Wtf
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
Haaa part 2, 3, 4 opening 🪟
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
32:03
John Hammond
Рет қаралды 69 М.
The delivery rescued them
00:52
Mamasoboliha
Рет қаралды 6 МЛН
I Need Your Help..
00:33
Stokes Twins
Рет қаралды 151 МЛН
Would you like a delicious big mooncake? #shorts#Mooncake #China #Chinesefood
00:30
КАРМАНЧИК 2 СЕЗОН 6 СЕРИЯ
21:57
Inter Production
Рет қаралды 488 М.
Return Oriented Programming (PicoCTF 2022 #48 'ropfu')
35:09
John Hammond
Рет қаралды 21 М.
Pwntools ROP Binary Exploitation - DownUnderCTF
55:21
John Hammond
Рет қаралды 86 М.
reverse engineering makes you a better programmer (let’s try it out)
13:12
Heap BINARY EXPLOITATION w/ Matt E!
1:10:24
John Hammond
Рет қаралды 22 М.
Python Pwntools Hacking: ret2libc GOT & PLT
44:49
John Hammond
Рет қаралды 46 М.
How They Hack: Buffer Overflow & GDB Analysis - James Lyne
16:06
GDB Tutorial
55:12
CS 246
Рет қаралды 61 М.
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
Binary Exploitation Deep Dive: Return to LIBC (with Matt)
2:12:41
John Hammond
Рет қаралды 185 М.
The delivery rescued them
00:52
Mamasoboliha
Рет қаралды 6 МЛН