Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Автор: LiveOverflow
Загружено: 2016-03-09
Просмотров: 15289
Part 1: reverse engineering the functionality of the cookbook binary with IDA
Part 2: Leaking heap address and libc base address
Part 3: Arbitrary write - House of Force
exploit: https://gist.github.com/LiveOverflow/...
=[ 🔴 Stuff I use ]=
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: https://liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ 📄 P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CTF #BinaryExploitation #HeapOverflow
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: