Format string exploit on an arduino - rhme2 Casino (pwn 150)

  Рет қаралды 17,976

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 29
@BillyEllis
@BillyEllis 7 жыл бұрын
Great stuff :D
@sjakievankooten
@sjakievankooten 7 жыл бұрын
Nice one again man. keep going ;)
@WorldandWarfare
@WorldandWarfare 7 жыл бұрын
you do great work mate!
@desheen5056
@desheen5056 7 жыл бұрын
mister overflow, you should make a patreon page
@aidenrhama9147
@aidenrhama9147 7 жыл бұрын
can i make a request. please make a video ret2libc in 64bit binary that require more than 1 argument, like a execeve function
@LiveOverflow
@LiveOverflow 7 жыл бұрын
I know I have been saying for a while now that more advanced stuff will come soon. And it will come "soon". I first want to finish editing all the rhme2 videos, then I have some other small projects and then I will tackle again binary exploitation. And stuff like that will be covered. But it might still take a while :(
@aidenrhama9147
@aidenrhama9147 7 жыл бұрын
that's good. hope you can finish it soon
@aidenrhama9147
@aidenrhama9147 7 жыл бұрын
wow great. got a new knowledge from you :D
@troz3799
@troz3799 7 жыл бұрын
Do you have a video on how to use python to "talk" to a network? I can kind of copy the code from here, but I'd like to see a more in depth video on it.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
yeah, checkout the videos from protostar in the binary exploitation playlist. Or see here: liveoverflow.com/binary_hacking/protostar/net0.html all the "net" and "final" levels include networking, where I had to write a little bit of networking. The code in this video is actually not networking, but it's a serial (UART) communication with an arduino board connected via USB.
@troz3799
@troz3799 7 жыл бұрын
Thanks
@maplicant232
@maplicant232 7 жыл бұрын
What does this sort of exploit look like in code? Is it some fault in C's string formatting? If so, why hasn't this been fixed already?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
Format string exploits is not really a fault by C (or the libc library). The programmer made a mistake and used for example "printf" wrong. The printf function has 1 or more parameters: printf(format, var1, var2, ...). If you want to print the string a user wrote you would have to write printf("%s", user_input);. But if you do a mistake and write printf(user_input), then now the user controls the format specifier and can use "%x %s" and more. Here is an example and a bit more explanation: liveoverflow.com/binary_hacking/protostar/format1.html
@maplicant232
@maplicant232 7 жыл бұрын
Thanks!
@mynewrandomhandle
@mynewrandomhandle 7 жыл бұрын
The source code of many challenges is in the Rhme2 github repository
@rambo6glaz438
@rambo6glaz438 7 жыл бұрын
Will you start making console hacking videos ? (like kernel exploit explanation) it would be so cool :)
@iLoveTurtlesHaha
@iLoveTurtlesHaha 7 жыл бұрын
I don't understand what is going on but it seems so interesting. I'm now learning C# (and coding in general) but still what he says in this video is going over my head. I'm guessing if I learned Python I won't be so lost. Anyone want to give some advice? Edit: I subbed because I need some of this guy's smarts to rub off on me XD.
@arunmagesh
@arunmagesh 7 жыл бұрын
Why can't we just do a strings on those binary and get the flag?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
I don't have access to the binary. The binary is encrypted with an unknown key. You uploaded it to an arduino, which uses a custom bootloader and an unknown embedded key to decrypt the challenge. Now you can interact with the board, but you cannot extract the decrypted binary.
@arunmagesh
@arunmagesh 7 жыл бұрын
LiveOverflow Flash it normally and use avrisp to extract it back. That way you can get the bootloader + flash which has what so ever key.
@arunmagesh
@arunmagesh 7 жыл бұрын
LiveOverflow Anyway I will try to replicate it and see how I can bypass that tomorrow morning.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
+Arun Magesh nope that won't work ;) the chip is locked. Otherwise each challenge could have been solved with reverse engineering.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
you can't replicate it, because the challenge arduino boards were flashed with the custom bootloader and shipped to us. The challenge binaries available on github are not encrypted and compatible with the standard arduino bootloader for anybody to try it.
@marcelbreiti8473
@marcelbreiti8473 7 жыл бұрын
ezpz :D
@0xff733
@0xff733 7 жыл бұрын
First boiiii
@redgek
@redgek 7 жыл бұрын
4th?
@benjaminlee3135
@benjaminlee3135 7 жыл бұрын
Third! :P
Remote format string exploit in syslog() - bin 0x1E
13:45
LiveOverflow
Рет қаралды 22 М.
人是不能做到吗?#火影忍者 #家人  #佐助
00:20
火影忍者一家
Рет қаралды 20 МЛН
The Best Band 😅 #toshleh #viralshort
00:11
Toshleh
Рет қаралды 22 МЛН
How Strong Is Tape?
00:24
Stokes Twins
Рет қаралды 96 МЛН
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
24:11
LiveOverflow
Рет қаралды 64 М.
Authentication Bypass Using Root Array
13:24
LiveOverflow
Рет қаралды 126 М.
Hacker Tweets Explained
13:47
LiveOverflow
Рет қаралды 160 М.
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 116 М.
人是不能做到吗?#火影忍者 #家人  #佐助
00:20
火影忍者一家
Рет қаралды 20 МЛН