Writing a Simple Buffer Overflow Exploit

  Рет қаралды 146,906

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 120
@0xc0ffee_
@0xc0ffee_ 5 жыл бұрын
2014: Really professional and rare videos 2019: 10:43 Please don't stop! We're loving the new LiveOverflow
@suicidalkatt
@suicidalkatt 5 жыл бұрын
IDK what you mean, that was just a randomly generated pattern, created professionally.
@xXLanyuzAnlunXx
@xXLanyuzAnlunXx 5 жыл бұрын
that statement is debatable
@SaeedAlFalasi
@SaeedAlFalasi 4 жыл бұрын
Lmao omg why didnt I ever think of this there I was using metasploit to generate a pattern
@tobiasgorgen7592
@tobiasgorgen7592 4 жыл бұрын
10:43? I present to you 15:55
@chezz444
@chezz444 5 жыл бұрын
Just a small note, at 17:45, the syntax "string[a:b]" isn't a list comprehension but is instead string slicing; a list comprehension is instead the syntax "[f(x) for x in iter]".
@laterz8260
@laterz8260 4 жыл бұрын
wgat
@otesunki
@otesunki 4 жыл бұрын
@@laterz8260 learn python you bootleg potato
@ari_archer
@ari_archer 2 жыл бұрын
@@laterz8260 a list complrehention like for example `hello = [x for x in range(10)]` is basically a compact version of: hello: list[int] = [] for x in range(10): hello.append(x) and string slicing (as an example `"hello world"[1:-1]` will slice characters, like remove, modify them: removing: >>> "hello world"[1:-1] 'ello worl' modifying: >>> "hello world"[::-1] 'dlrow olleh' You can read more about both in the python documentation and on the internet
@mrocto329
@mrocto329 2 жыл бұрын
@@laterz8260 list comprehension is basically like how you define sets in maths. E.g. in maths you'd do {(a, b, c) | c^2 = a^2 + b^2 and a, b, c \in Z} to get all pythagorean triples. This notation is easy to read and work with, so python and some other languages added it.
@therudolfgaming4631
@therudolfgaming4631 5 жыл бұрын
I was giving a presentation on Buffer Overflows just as this video released! The timing when the notification popped on screen was just perfect hahaha
@EchoXIIIGO
@EchoXIIIGO 5 жыл бұрын
Yeet
@rusirumunasingha2234
@rusirumunasingha2234 4 жыл бұрын
Loving the new vids! Keep them coming!
@klightspeed
@klightspeed 4 жыл бұрын
For the executable shellcode on the stack to work (i.e. not using return oriented programming), you'd have to have an executable stack, which means W^X would need to be disabled.
@chiabobo
@chiabobo 5 жыл бұрын
Cool video as always! Thanks for the detailed explanations!
@maddelasaikarthik7563
@maddelasaikarthik7563 5 жыл бұрын
you are on fire , keep it going
@tafama
@tafama 4 жыл бұрын
Can you give a link about that geohot ctf you talked in the video?
@almightyhydra
@almightyhydra 5 жыл бұрын
Why does two %p leak the input buffer address, I wonder. Also, how do you need to change the method if working in a telnet to a remote server where you can't use gdb?
@YdenPL
@YdenPL 5 жыл бұрын
If he streamed this instead... It'd be a... Live Overflow *ba dum tss*
@coffeedata7107
@coffeedata7107 5 жыл бұрын
ಠ_ಠ
@KangJangkrik
@KangJangkrik 4 жыл бұрын
Darn... spilled coffee again (oh the coffee is quite overflow btw)
@capkenway
@capkenway 5 жыл бұрын
"Simple" Buffer Overflow
@Zooiest
@Zooiest 5 жыл бұрын
ikr
@krztix
@krztix 5 жыл бұрын
that's what i was thinking, am i really that bad? haha
@user255
@user255 5 жыл бұрын
It is simple and too simple to work on out of the box Ubuntu.
@m3mory_leak344
@m3mory_leak344 3 жыл бұрын
You're just bad
@georgehammond867
@georgehammond867 4 жыл бұрын
very nice [while loop], keep Up the good work
@rishi905
@rishi905 5 жыл бұрын
It's really awesome man
@SourceCodeDeleted
@SourceCodeDeleted 5 жыл бұрын
PWNIE Racing is AWESOME!!!
@ZetaTwo
@ZetaTwo 5 жыл бұрын
:D
@EvilSapphireR
@EvilSapphireR 5 жыл бұрын
I love LiveOverFlow not only because of his amazing content, but because he always points me to other marvellous KZbinrs. He introduced me to OAlabs before, and now yet another awesome KZbin channel to expand my knowledge!
@bumblybeenard
@bumblybeenard 5 жыл бұрын
Good video! Very informative!
@nin10dorox
@nin10dorox 4 жыл бұрын
All the stuff where you're looking at the disassembled code and reading which bytes the buffer took up, real hackers can't do that right? If you're attacking over the internet, will you be able to do the same thing? Is it even possible to carry out this attack if you can't do those steps?
@quantum4691
@quantum4691 4 жыл бұрын
How the shell(shell code) connects to you? Over telnet?
@gwg
@gwg 5 жыл бұрын
At 0:33, you say to use ``apt-get install socat``. The apt command without the "-get" is like apt-get, but designed for use for humans. It has color coding and fancy progress bars and looks better on your terminal. Do ``apt install socat`` instead. See askubuntu.com/questions/445384/what-is-the-difference-between-apt-and-apt-get
@happygimp0
@happygimp0 5 жыл бұрын
And less to type.
@sumitlahiri209
@sumitlahiri209 5 жыл бұрын
@LiveOverflow Thanks to your videos and constantly inspiring us to learn new things. I was able to reverse engineer a feature in WhatsApp. Thanks again for all the videos you have made. They are just awesome.
@solveit1304
@solveit1304 5 жыл бұрын
I wish myself that when December is over LiveOverflow still uploading videos daily...
@delphicdescant
@delphicdescant 5 жыл бұрын
You've always put out such good content, and I love it, but despite that, I've never understood how this channel gets so many views, since this subject isn't exactly aimed at a general audience. Are there way more people out there doing security stuff than I think, or are there lots of people who watch without really having a reason to do so?
@SFDeku
@SFDeku 5 жыл бұрын
I see a lot of programmers or devops staff in real life recommending me this channel who are not that much into security.
@ME0WMERE
@ME0WMERE Жыл бұрын
I don't do security, but I watch these videos because they're interesting you underestimate how much computer-related stuff nerds will watch
@StarliskJanova
@StarliskJanova 4 жыл бұрын
Is this a demonstration of the bleeding server error that was on the news for a while back ?
@eagle772
@eagle772 4 жыл бұрын
What’s the best IDE to use?
@Cochise85
@Cochise85 4 жыл бұрын
As a noob ... Is he targeting his own OS or another VM/host ?
@sniGGandBaShoR
@sniGGandBaShoR 4 жыл бұрын
Hey I like your videos! Subscribed =) Did you find your bachelor and masters usefull? Or would you say somebody without a degree (maybe just apprenticeship, and general really good software engineer) has a can get a job in the field as a security engineer / ethical hacking ?
@channel-yx1gt
@channel-yx1gt 2 жыл бұрын
13:25 "we should CC what it does"
@PeetHobby
@PeetHobby 2 жыл бұрын
He got it at the first try, after ten practice rounds and prepared a program for the video. :D
@diarykeeper
@diarykeeper 4 жыл бұрын
A 1337 port, huh ? Well done instruction. Any reason for why you prefer unix ?
@kangalio
@kangalio 5 жыл бұрын
I'm noticing that since you started pumping videos out daily, those videos also changed in their topics. They're much more beginner-oriented now and are often even a bit clickbaity. I do hope we will see some more advanced videos of you soon, in the same animated style as back then (that was fantastic!), like you used to do. That would make many of your old fans happy
@EvilSapphireR
@EvilSapphireR 5 жыл бұрын
I doubt a format string exploit on a live executable is completely 'novice oriented'.
@kangalio
@kangalio 5 жыл бұрын
@@EvilSapphireR okay I realize that word was exaggerating it a bit. I edited it out
@LiveOverflow
@LiveOverflow 5 жыл бұрын
Even during this special time I released a regular video. Checkout the iOS jailbreak video about the sockpuppet vuln.
@zyrohnmng
@zyrohnmng 5 жыл бұрын
@@LiveOverflow Idk how it would affect views, but consider adding a difficulty level to the videos? [basics] [intermediate] etc... Either way, awesome content :)
@excitedbox5705
@excitedbox5705 5 жыл бұрын
@@zyrohnmng That is a good idea. It is hard to know when starting a video if I am even gonna understand it and a difficulty marker would let me judge better if I want to watch it. I wish more youtubers would do that when making highly technical videos that expect you to have experience in the subject.
@beron_the_colossus
@beron_the_colossus 5 жыл бұрын
14:43, I can't believe you've done this
@berrabe3917
@berrabe3917 5 жыл бұрын
can you explain what is stack and offset
@happygimp0
@happygimp0 5 жыл бұрын
en.wikipedia.org/wiki/Stack_%28abstract_data_type%29 The stack is mainly used for return addresses (to go back to the next instruction after a function call) and local variables.
@R0-B1t
@R0-B1t 5 жыл бұрын
What mouse do you use?
@DynoosHD
@DynoosHD 5 жыл бұрын
how would a fix of the server programm look like?
@nikiibarbaro
@nikiibarbaro 5 жыл бұрын
Don't use gets function
@DynoosHD
@DynoosHD 5 жыл бұрын
@@nikiibarbaro and use instead?
@nikiibarbaro
@nikiibarbaro 5 жыл бұрын
DynoosHD fgets because you can set the length of the string which will be handled
@DynoosHD
@DynoosHD 5 жыл бұрын
@@nikiibarbaro so here: fgets(buf, 256, sdtin); in line 17 would do the trick?
@nikiibarbaro
@nikiibarbaro 5 жыл бұрын
DynoosHD I think yes
@Laurent1110
@Laurent1110 5 жыл бұрын
This is great! I was looking for a way to make the challenges I made accessible easily over the network. I havent thought about using socat but I'll try this next time! You've used Python2 in this video, but what is exactly the problematic with Python3? Is it just that the conversions are annoying ?
@p0n-pompf
@p0n-pompf 5 жыл бұрын
@Gareth Ma there is a version of pwntools for python3 as well
@ZetaTwo
@ZetaTwo 5 жыл бұрын
@Gareth Ma Pwntools for Python 3 is still beta but I have been running it for the past year without problems. Only minor inconveniences but totally usable.
@omran.alshehabi
@omran.alshehabi 5 жыл бұрын
You're amazing dude ✌🏻
@ssfdf7751
@ssfdf7751 2 жыл бұрын
10:44 msf-create_pattern -l 150
@luecu
@luecu 4 жыл бұрын
why the +8?
@waplet
@waplet 5 жыл бұрын
These two videos were like "Memento"
@aryangupta7414
@aryangupta7414 5 жыл бұрын
Dont remember C or C++ but learnt python can we make same exploit in any language?
@MissionFailed2
@MissionFailed2 4 жыл бұрын
Yes. You can do it by hand even. The point is to send a specially crafted string to the server. That's it.
@abhaasgoyal1376
@abhaasgoyal1376 5 жыл бұрын
Nice one
@myczxr
@myczxr 2 жыл бұрын
i just interested in these kind of things, so i have no idea what all these mean, but i'll be back in a few with a more thorough understanding. wish me luck
@drw0if
@drw0if 5 жыл бұрын
Why don't you use pwnlib instead of struct, socket and telnet? It should be easier!
@d1rtyharry378
@d1rtyharry378 5 жыл бұрын
Notification squad✊
@SWonYT
@SWonYT 5 жыл бұрын
This is EXACTLY what I needed!! Thank you!!! If anyone sees this that knows of any undergraduate minority male scholarships, please let me know!!!
@toidihack8151
@toidihack8151 5 жыл бұрын
I just love you make more video about create hacking python programs :)))
@CameronNoakes
@CameronNoakes 4 жыл бұрын
Calle! I follow him on twitter and didnt even know he had a YT. Hes got 3 degrees and is head of security, insane! I knew it was him not from his name but from his profile pic.
@JacquesBoscq
@JacquesBoscq 5 жыл бұрын
17:04 "Anyways let's execute this. Anyways let's execute this"... First try / no debugging, really? -_-
@kavandsl1942
@kavandsl1942 5 жыл бұрын
More likely to be a necessary edit to maintain quality of video (maybe he sneezed immediately after or something and just did a quick retake of the shot). It's far less likely that he was disingenuous as the code was not altered and anyone can really follow along to replicate the steps themselves.
@kavandsl1942
@kavandsl1942 5 жыл бұрын
also- this would of been a great opportunity for a cliche matrix glitch joke!
@chrono0097
@chrono0097 5 жыл бұрын
Sometimes you reach a point where you can code something and expect it to work first try, it happens to me, and happends to a lot of programmers
@markopekovic2417
@markopekovic2417 5 жыл бұрын
while "14:44 ~ 14:45" == true
@SWonYT
@SWonYT 5 жыл бұрын
Of the years that I've been watching this channel, I just noticed that your new logo sequence is an animated buffer overflow attack
@SWonYT
@SWonYT 5 жыл бұрын
Then it dynamically allocates the memory to fix it
@gwnbw
@gwnbw 5 жыл бұрын
Haha love the thumbnail thats my face when I RE
@waplet
@waplet 5 жыл бұрын
Bam!
@Ootskullkid
@Ootskullkid 4 жыл бұрын
Just realized that socat is listening in on port "leet" lol
@shinixshuxd9949
@shinixshuxd9949 4 жыл бұрын
I thought this is simple buffet overflow!
@groowy
@groowy 5 жыл бұрын
little tip for script kiddies that just headlessly downloaded files form the gist, executed it and don't know why it doesn't work the gcc outputs file called "cap" but the socat wants to execute file called "caf" so guess what you have to do :) I'm sorry if this was intentional and I've ruined the fun
@kevinalexander4959
@kevinalexander4959 4 жыл бұрын
This guy looks a lot like Michael Cera
@gyroninjamodder
@gyroninjamodder 5 жыл бұрын
Python 2 will reach its EOL in two weeks. You should not be teaching people to use software that is no longer maintained. Python 3 came out over a decade ago. Get with the times.
@LiveOverflow
@LiveOverflow 5 жыл бұрын
Yolo
@yurandeveloper6958
@yurandeveloper6958 5 жыл бұрын
LiveOverflow dinosaur... Lol
@adi331
@adi331 5 жыл бұрын
python2 is still good.
@gyroninjamodder
@gyroninjamodder 5 жыл бұрын
@@adi331 Not, for a tutorial meant to be watched in the future. In these upcoming months Linux distros will start to remove python 2 from the package repositories.
@adi331
@adi331 5 жыл бұрын
really , are you sure about that ?
@lior_haddad
@lior_haddad 5 жыл бұрын
Hi
@Zooiest
@Zooiest 5 жыл бұрын
Hi
@coffeedata7107
@coffeedata7107 5 жыл бұрын
Hi
@loppuun4928
@loppuun4928 5 жыл бұрын
the best way to make a comment is not to be the 14th post in the comment section
@Schlumpfpirat
@Schlumpfpirat 5 жыл бұрын
17:05 - moments after "first try" cringe
@ThatGamerBlue
@ThatGamerBlue 4 жыл бұрын
didnt ask
@m9gam
@m9gam 4 жыл бұрын
Clearly a joke but ok
@viniciusVS8v
@viniciusVS8v 5 жыл бұрын
"Simple"
@tr909love
@tr909love 3 жыл бұрын
Why don't you fucking hack the latest ps4 firmware ffs ?
@p1nkfreud
@p1nkfreud 5 жыл бұрын
And a new generation of $criptkiddies is spawned...here, I'll even help: slight modifications of this will work on "private VPN servers" which are usually emulated VMs, with a little ingenuity you can gain server root
@privateger
@privateger 4 жыл бұрын
What?
@realityveil6151
@realityveil6151 5 жыл бұрын
Please dont act like an obnoxious hacker. You start out doing it ironically but next thing you know you can't stop and what was once ironic and funny just became what you do. Just lile me and yeet. I started saying it to annoy my friends and be ironic, but now I just say It as part of my vocabulary. Don't let this happen to you.
@yxor
@yxor 5 жыл бұрын
python 2? disliked and unsubscribed.
@mustafakhalid9348
@mustafakhalid9348 5 жыл бұрын
Relax butt hurt.
@privateger
@privateger 4 жыл бұрын
lmao
The Heap: what does malloc() do? - bin 0x14
9:52
LiveOverflow
Рет қаралды 150 М.
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
Sigma girl VS Sigma Error girl 2  #shorts #sigma
0:27
Jin and Hattie
Рет қаралды 124 МЛН
24 Часа в БОУЛИНГЕ !
27:03
A4
Рет қаралды 7 МЛН
Exploit Dev Pitfall Corrupted Shellcode
16:36
LiveOverflow
Рет қаралды 35 М.
Local Root Exploit in HospitalRun Software
20:48
LiveOverflow
Рет қаралды 69 М.
Hacker Tweets Explained
13:47
LiveOverflow
Рет қаралды 161 М.
the truth about ChatGPT generated code
10:35
Low Level
Рет қаралды 240 М.
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
9:50
How They Hack: Buffer Overflow & GDB Analysis - James Lyne
16:06
Where to start with exploit development
13:59
David Bombal Clips
Рет қаралды 18 М.
"Clean" Code, Horrible Performance
22:41
Molly Rocket
Рет қаралды 945 М.
how do hackers exploit buffers that are too small?
8:25
Low Level
Рет қаралды 209 М.
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 117 М.