W2_2 - Return-to-libc attack

  Рет қаралды 21,671

NPTEL-NOC IITM

NPTEL-NOC IITM

Күн бұрын

"This video is part of the NPTEL course Information Security module 5 and covers topics on Secure Systems Engineering.
The Virtual Machine used in the demo videos can be found here:
drive.google.com/file/d/1wLNV....
The slides and other associated materials can be accessed here:
bitbucket.org/casl/sse."
To access the translated content:
1. The translated content of this course is available in regional languages. For details please visit nptel.ac.in/translation
The video course content can be accessed in the form of regional language text transcripts, books which can be accessed under downloads of each course, subtitles in the video and Video Text Track below the video.
Your feedback is highly appreciated. Kindly fill this form forms.gle/XFZhSnHsCLML2LXA6
2. Regional language subtitles available for this course
To watch the subtitles in regional languages:
1. Click on the lecture under Course Details.
2. Play the video.
3. Now click on the Settings icon and a list of features will display
4. From that select the option Subtitles/CC.
5. Now select the Language from the available languages to read the subtitle in the regional language.

Пікірлер: 12
@JannisAdmek
@JannisAdmek 3 жыл бұрын
This is so interesting, and you are very good at explaining! From the bottom of my heart, thank you for these free lessons!
@sylviashen3838
@sylviashen3838 4 жыл бұрын
Thanks for this tutorial. Now I know how return to libc attack worked. It helps a lot!
@123liveo
@123liveo 4 жыл бұрын
Excellent. Thanks very much for the video. Very useful!!
@amoldhamale3202
@amoldhamale3202 Жыл бұрын
so if I understood this correctly, this attack would work on non-exec stack but It would fail for canaries because before returning the canary value would be checked. Am I right?
@m07hcn62
@m07hcn62 3 жыл бұрын
Thank you sir for this clear explanation !
@ffwfcf
@ffwfcf 2 жыл бұрын
i really wanna hug that man, thanks a lot
@Quancept
@Quancept 3 жыл бұрын
Thank you sir!
@pradipgareja3848
@pradipgareja3848 3 жыл бұрын
thank you sir...
@theanhart6048
@theanhart6048 8 ай бұрын
thanks you very much for this video
@user-op2gu4bp8n
@user-op2gu4bp8n Жыл бұрын
thanks a lot!!
@tommymairo8964
@tommymairo8964 2 жыл бұрын
10:56 why should we offset 4 bytes on the stack?
@tommymairo8964
@tommymairo8964 2 жыл бұрын
11:47 why exit function will get called after system function completion?
W2_3 - ROP Attacks
31:16
NPTEL-NOC IITM
Рет қаралды 10 М.
OMG 😨 Era o tênis dela 🤬
00:19
Polar em português
Рет қаралды 10 МЛН
КАРМАНЧИК 2 СЕЗОН 6 СЕРИЯ
21:57
Inter Production
Рет қаралды 363 М.
КАКОЙ ВАШ ЛЮБИМЫЙ ЦВЕТ?😍 #game #shorts
00:17
How They Hack: Buffer Overflow & GDB Analysis - James Lyne
16:06
W4_1 - Format string vulnerabilities
25:24
NPTEL-NOC IITM
Рет қаралды 10 М.
How to exploit a buffer overflow vulnerability - Practical
9:44
Daniel Slater
Рет қаралды 267 М.
SEED Labs: Return to libc Attack
14:10
Professor Sadat
Рет қаралды 2,3 М.
Buffer Overflow Hacking Tutorial (Bypass Passwords)
55:39
David Bombal
Рет қаралды 68 М.
W8 L3 Buffer Overflow Attacks
28:10
Introduction to Operating Systems
Рет қаралды 23 М.
Stack Canary
7:00
Aaron Yoo
Рет қаралды 12 М.
Buffer Overflow
5:58
Aaron Yoo
Рет қаралды 36 М.
OMG 😨 Era o tênis dela 🤬
00:19
Polar em português
Рет қаралды 10 МЛН