2014: Really professional and rare videos 2019: 10:43 Please don't stop! We're loving the new LiveOverflow
@suicidalkatt5 жыл бұрын
IDK what you mean, that was just a randomly generated pattern, created professionally.
@xXLanyuzAnlunXx5 жыл бұрын
that statement is debatable
@SaeedAlFalasi4 жыл бұрын
Lmao omg why didnt I ever think of this there I was using metasploit to generate a pattern
@tobiasgorgen75924 жыл бұрын
10:43? I present to you 15:55
@chezz4445 жыл бұрын
Just a small note, at 17:45, the syntax "string[a:b]" isn't a list comprehension but is instead string slicing; a list comprehension is instead the syntax "[f(x) for x in iter]".
@laterz82604 жыл бұрын
wgat
@otesunki4 жыл бұрын
@@laterz8260 learn python you bootleg potato
@ari_archer2 жыл бұрын
@@laterz8260 a list complrehention like for example `hello = [x for x in range(10)]` is basically a compact version of: hello: list[int] = [] for x in range(10): hello.append(x) and string slicing (as an example `"hello world"[1:-1]` will slice characters, like remove, modify them: removing: >>> "hello world"[1:-1] 'ello worl' modifying: >>> "hello world"[::-1] 'dlrow olleh' You can read more about both in the python documentation and on the internet
@mrocto3292 жыл бұрын
@@laterz8260 list comprehension is basically like how you define sets in maths. E.g. in maths you'd do {(a, b, c) | c^2 = a^2 + b^2 and a, b, c \in Z} to get all pythagorean triples. This notation is easy to read and work with, so python and some other languages added it.
@therudolfgaming46315 жыл бұрын
I was giving a presentation on Buffer Overflows just as this video released! The timing when the notification popped on screen was just perfect hahaha
@EchoXIIIGO5 жыл бұрын
Yeet
@rusirumunasingha22344 жыл бұрын
Loving the new vids! Keep them coming!
@klightspeed4 жыл бұрын
For the executable shellcode on the stack to work (i.e. not using return oriented programming), you'd have to have an executable stack, which means W^X would need to be disabled.
@chiabobo5 жыл бұрын
Cool video as always! Thanks for the detailed explanations!
@maddelasaikarthik75635 жыл бұрын
you are on fire , keep it going
@tafama4 жыл бұрын
Can you give a link about that geohot ctf you talked in the video?
@almightyhydra5 жыл бұрын
Why does two %p leak the input buffer address, I wonder. Also, how do you need to change the method if working in a telnet to a remote server where you can't use gdb?
@YdenPL5 жыл бұрын
If he streamed this instead... It'd be a... Live Overflow *ba dum tss*
@coffeedata71075 жыл бұрын
ಠ_ಠ
@KangJangkrik4 жыл бұрын
Darn... spilled coffee again (oh the coffee is quite overflow btw)
@capkenway5 жыл бұрын
"Simple" Buffer Overflow
@Zooiest5 жыл бұрын
ikr
@krztix5 жыл бұрын
that's what i was thinking, am i really that bad? haha
@user2555 жыл бұрын
It is simple and too simple to work on out of the box Ubuntu.
@m3mory_leak3443 жыл бұрын
You're just bad
@georgehammond8674 жыл бұрын
very nice [while loop], keep Up the good work
@rishi9055 жыл бұрын
It's really awesome man
@SourceCodeDeleted5 жыл бұрын
PWNIE Racing is AWESOME!!!
@ZetaTwo5 жыл бұрын
:D
@EvilSapphireR5 жыл бұрын
I love LiveOverFlow not only because of his amazing content, but because he always points me to other marvellous KZbinrs. He introduced me to OAlabs before, and now yet another awesome KZbin channel to expand my knowledge!
@bumblybeenard5 жыл бұрын
Good video! Very informative!
@nin10dorox4 жыл бұрын
All the stuff where you're looking at the disassembled code and reading which bytes the buffer took up, real hackers can't do that right? If you're attacking over the internet, will you be able to do the same thing? Is it even possible to carry out this attack if you can't do those steps?
@quantum46914 жыл бұрын
How the shell(shell code) connects to you? Over telnet?
@gwg5 жыл бұрын
At 0:33, you say to use ``apt-get install socat``. The apt command without the "-get" is like apt-get, but designed for use for humans. It has color coding and fancy progress bars and looks better on your terminal. Do ``apt install socat`` instead. See askubuntu.com/questions/445384/what-is-the-difference-between-apt-and-apt-get
@happygimp05 жыл бұрын
And less to type.
@sumitlahiri2095 жыл бұрын
@LiveOverflow Thanks to your videos and constantly inspiring us to learn new things. I was able to reverse engineer a feature in WhatsApp. Thanks again for all the videos you have made. They are just awesome.
@solveit13045 жыл бұрын
I wish myself that when December is over LiveOverflow still uploading videos daily...
@delphicdescant5 жыл бұрын
You've always put out such good content, and I love it, but despite that, I've never understood how this channel gets so many views, since this subject isn't exactly aimed at a general audience. Are there way more people out there doing security stuff than I think, or are there lots of people who watch without really having a reason to do so?
@SFDeku5 жыл бұрын
I see a lot of programmers or devops staff in real life recommending me this channel who are not that much into security.
@ME0WMERE Жыл бұрын
I don't do security, but I watch these videos because they're interesting you underestimate how much computer-related stuff nerds will watch
@StarliskJanova4 жыл бұрын
Is this a demonstration of the bleeding server error that was on the news for a while back ?
@eagle7724 жыл бұрын
What’s the best IDE to use?
@Cochise854 жыл бұрын
As a noob ... Is he targeting his own OS or another VM/host ?
@sniGGandBaShoR4 жыл бұрын
Hey I like your videos! Subscribed =) Did you find your bachelor and masters usefull? Or would you say somebody without a degree (maybe just apprenticeship, and general really good software engineer) has a can get a job in the field as a security engineer / ethical hacking ?
@channel-yx1gt2 жыл бұрын
13:25 "we should CC what it does"
@PeetHobby2 жыл бұрын
He got it at the first try, after ten practice rounds and prepared a program for the video. :D
@diarykeeper4 жыл бұрын
A 1337 port, huh ? Well done instruction. Any reason for why you prefer unix ?
@kangalio5 жыл бұрын
I'm noticing that since you started pumping videos out daily, those videos also changed in their topics. They're much more beginner-oriented now and are often even a bit clickbaity. I do hope we will see some more advanced videos of you soon, in the same animated style as back then (that was fantastic!), like you used to do. That would make many of your old fans happy
@EvilSapphireR5 жыл бұрын
I doubt a format string exploit on a live executable is completely 'novice oriented'.
@kangalio5 жыл бұрын
@@EvilSapphireR okay I realize that word was exaggerating it a bit. I edited it out
@LiveOverflow5 жыл бұрын
Even during this special time I released a regular video. Checkout the iOS jailbreak video about the sockpuppet vuln.
@zyrohnmng5 жыл бұрын
@@LiveOverflow Idk how it would affect views, but consider adding a difficulty level to the videos? [basics] [intermediate] etc... Either way, awesome content :)
@excitedbox57055 жыл бұрын
@@zyrohnmng That is a good idea. It is hard to know when starting a video if I am even gonna understand it and a difficulty marker would let me judge better if I want to watch it. I wish more youtubers would do that when making highly technical videos that expect you to have experience in the subject.
@beron_the_colossus5 жыл бұрын
14:43, I can't believe you've done this
@berrabe39175 жыл бұрын
can you explain what is stack and offset
@happygimp05 жыл бұрын
en.wikipedia.org/wiki/Stack_%28abstract_data_type%29 The stack is mainly used for return addresses (to go back to the next instruction after a function call) and local variables.
@R0-B1t5 жыл бұрын
What mouse do you use?
@DynoosHD5 жыл бұрын
how would a fix of the server programm look like?
@nikiibarbaro5 жыл бұрын
Don't use gets function
@DynoosHD5 жыл бұрын
@@nikiibarbaro and use instead?
@nikiibarbaro5 жыл бұрын
DynoosHD fgets because you can set the length of the string which will be handled
@DynoosHD5 жыл бұрын
@@nikiibarbaro so here: fgets(buf, 256, sdtin); in line 17 would do the trick?
@nikiibarbaro5 жыл бұрын
DynoosHD I think yes
@Laurent11105 жыл бұрын
This is great! I was looking for a way to make the challenges I made accessible easily over the network. I havent thought about using socat but I'll try this next time! You've used Python2 in this video, but what is exactly the problematic with Python3? Is it just that the conversions are annoying ?
@p0n-pompf5 жыл бұрын
@Gareth Ma there is a version of pwntools for python3 as well
@ZetaTwo5 жыл бұрын
@Gareth Ma Pwntools for Python 3 is still beta but I have been running it for the past year without problems. Only minor inconveniences but totally usable.
@omran.alshehabi5 жыл бұрын
You're amazing dude ✌🏻
@ssfdf77512 жыл бұрын
10:44 msf-create_pattern -l 150
@luecu4 жыл бұрын
why the +8?
@waplet5 жыл бұрын
These two videos were like "Memento"
@aryangupta74145 жыл бұрын
Dont remember C or C++ but learnt python can we make same exploit in any language?
@MissionFailed24 жыл бұрын
Yes. You can do it by hand even. The point is to send a specially crafted string to the server. That's it.
@abhaasgoyal13765 жыл бұрын
Nice one
@myczxr2 жыл бұрын
i just interested in these kind of things, so i have no idea what all these mean, but i'll be back in a few with a more thorough understanding. wish me luck
@drw0if5 жыл бұрын
Why don't you use pwnlib instead of struct, socket and telnet? It should be easier!
@d1rtyharry3785 жыл бұрын
Notification squad✊
@SWonYT5 жыл бұрын
This is EXACTLY what I needed!! Thank you!!! If anyone sees this that knows of any undergraduate minority male scholarships, please let me know!!!
@toidihack81515 жыл бұрын
I just love you make more video about create hacking python programs :)))
@CameronNoakes4 жыл бұрын
Calle! I follow him on twitter and didnt even know he had a YT. Hes got 3 degrees and is head of security, insane! I knew it was him not from his name but from his profile pic.
@JacquesBoscq5 жыл бұрын
17:04 "Anyways let's execute this. Anyways let's execute this"... First try / no debugging, really? -_-
@kavandsl19425 жыл бұрын
More likely to be a necessary edit to maintain quality of video (maybe he sneezed immediately after or something and just did a quick retake of the shot). It's far less likely that he was disingenuous as the code was not altered and anyone can really follow along to replicate the steps themselves.
@kavandsl19425 жыл бұрын
also- this would of been a great opportunity for a cliche matrix glitch joke!
@chrono00975 жыл бұрын
Sometimes you reach a point where you can code something and expect it to work first try, it happens to me, and happends to a lot of programmers
@markopekovic24175 жыл бұрын
while "14:44 ~ 14:45" == true
@SWonYT5 жыл бұрын
Of the years that I've been watching this channel, I just noticed that your new logo sequence is an animated buffer overflow attack
@SWonYT5 жыл бұрын
Then it dynamically allocates the memory to fix it
@gwnbw5 жыл бұрын
Haha love the thumbnail thats my face when I RE
@waplet5 жыл бұрын
Bam!
@Ootskullkid4 жыл бұрын
Just realized that socat is listening in on port "leet" lol
@shinixshuxd99494 жыл бұрын
I thought this is simple buffet overflow!
@groowy5 жыл бұрын
little tip for script kiddies that just headlessly downloaded files form the gist, executed it and don't know why it doesn't work the gcc outputs file called "cap" but the socat wants to execute file called "caf" so guess what you have to do :) I'm sorry if this was intentional and I've ruined the fun
@kevinalexander49594 жыл бұрын
This guy looks a lot like Michael Cera
@gyroninjamodder5 жыл бұрын
Python 2 will reach its EOL in two weeks. You should not be teaching people to use software that is no longer maintained. Python 3 came out over a decade ago. Get with the times.
@LiveOverflow5 жыл бұрын
Yolo
@yurandeveloper69585 жыл бұрын
LiveOverflow dinosaur... Lol
@adi3315 жыл бұрын
python2 is still good.
@gyroninjamodder5 жыл бұрын
@@adi331 Not, for a tutorial meant to be watched in the future. In these upcoming months Linux distros will start to remove python 2 from the package repositories.
@adi3315 жыл бұрын
really , are you sure about that ?
@lior_haddad5 жыл бұрын
Hi
@Zooiest5 жыл бұрын
Hi
@coffeedata71075 жыл бұрын
Hi
@loppuun49285 жыл бұрын
the best way to make a comment is not to be the 14th post in the comment section
@Schlumpfpirat5 жыл бұрын
17:05 - moments after "first try" cringe
@ThatGamerBlue4 жыл бұрын
didnt ask
@m9gam4 жыл бұрын
Clearly a joke but ok
@viniciusVS8v5 жыл бұрын
"Simple"
@tr909love3 жыл бұрын
Why don't you fucking hack the latest ps4 firmware ffs ?
@p1nkfreud5 жыл бұрын
And a new generation of $criptkiddies is spawned...here, I'll even help: slight modifications of this will work on "private VPN servers" which are usually emulated VMs, with a little ingenuity you can gain server root
@privateger4 жыл бұрын
What?
@realityveil61515 жыл бұрын
Please dont act like an obnoxious hacker. You start out doing it ironically but next thing you know you can't stop and what was once ironic and funny just became what you do. Just lile me and yeet. I started saying it to annoy my friends and be ironic, but now I just say It as part of my vocabulary. Don't let this happen to you.