Linux Binary Exploitation
Автор: hexdump
Загружено: 2024-09-18
Просмотров: 1626
Hi and welcome to this new video!
In this video we continue the "Linux Privilege Escalation" series by discussing the core idea behind binary exploitation and how it can be used to perform privilege escalation.
To build intuition regarding this video, I show a very simple stack-based buffer overflow that will allows us to transform an apparently meaningless program into an arbitrary shell. For the purpose of the video various memory protection mechanism were disabled. However it is important to realize that even modern protections sometimes can be bypassed by skilled enough researchers.
Thank you very much!
-------------------------
TIMESTAMP
00:00 Introduction
02:00 What is a Buffer Overflow?
08:25 Example of Vulnerable Code
13:20 Assumptions on Memory Protections
19:00 Analysis with GDB
29:00 Visualize Stack-Based Buffer Overflows
30:20 Computation of offset
32:30 Exploitation Strategy
35:20 Shellcode
37:30 Payload Structure
39:00 Generation of Paylod
43:25 Final Exploit
45:00 Takeways
-------------------------
REFERENCES
Material: https://github.com/LeonardoE95/yt-en/...
Smashing the Stack for Fun and Profit: https://phrack.org/issues/49/14.html
-------------------------
CONTACTS
Blog: https://blog.leonardotamiano.xyz/
Github: https://github.com/LeonardoE95?tab=re...
Support: https://www.paypal.com/donate/?hosted...
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: