Buffer Overflow Explained | P23 | Stack Pivot and Ret2libc | CTF Walkthrough
Автор: Motasem Hamdan
Загружено: 2023-10-04
Просмотров: 768
In this video walk-through, we covered another case of a binary vulnerable to buffer overflow but has some protections enabled such as NX and PIE. To get around these protections, we leaked a binary address and subtracted the address from a specific offset found by subtracting a start of the user input in memory from the start of the stack. Then we build the ROP chain consisting of GOT, PLT, setvbuf, system and /bin/sh offsets so that these gadgets will execute in the memory stack and return shell.
**********
Receive Cyber Security Field, Certifications Notes and Special Training Videos
/ @motasemhamdan
******
Writeup
https://motasem-notes.net/buffer-over...
HackTheBox HTB Pwnshop
https://app.hackthebox.com/challenges...
Libc Database
https://libc.rip/
********
Patreon
https://www.patreon.com/motasemhamdan...
Instagram
/ dev.stuxnet
Twitter
/ manmotasem
Facebook
/ motasemhamdantty
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb42481b2
Website
https://www.motasem-notes.net
Backup channel
/ @movieflicksphantom
My Movie channel:
/ Канал
******

Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: