Pwntools - Pwn Zero To Hero 0x04

preview_player
Показать описание


📞 Discord: PinkDraconian#9907

00:00 Introduction
00:23 What will we be learning?
01:30 Using pwntools
15:40 Conclusion
Рекомендации по теме
Комментарии
Автор

This video was super helpful. I felt totally lost going through pwntools scripts and templates because so many different things all put together. This was a great introductory video.

RustysAdventures
Автор

Really great walk-through and content. This really helped me as I was looking for how to use gdb and debug with my pwntools scripts!

You can also specify the endianness as a parameter for the p64 packing function which can help a lot if ur data isnt hardcoded and cant compute it manually.

richaveli
Автор

This is beautiful content man. I feel motivated to deep dive into pwning.

ByClickingKeys
Автор

Thanks, I've been looking forward to the next episode ! 👏👏

stereosteve
Автор

Looooking forward to it, thank you soo much

marcovalentinoalvarado
Автор

In christmas holiday going on, I took a break from Bug Bounty as I felt burn out and so wanted to focus on pwn challenges of CTFs'. Man, this video and the playlist is so much fun. Thanks for making my holiday awsome bro. Cheers

nghtmar_orin
Автор

just continue bro we all going to make it

hexoabla
Автор

this helps me a lot to get the basics fast RESPECT <3

darkreal
Автор

would u continue this series ? i wonder cuz ur video kinda nice for someone new to this stuff like me. Anyway, i love this series, hope you can continue it !

kon
Автор

I think you might be confusing terms. Least significant bit describes numbering on bit level. I think you meant little endian in this case.

Also, the shebang is not processed by bash but the exec* family system calls process it.

Forgot the most important part, great video! :)

flupzor
Автор

Superb quality as usual! 💜 5:50 could also do "print(io.recvlines(6))" to save some space

_CryptoCat
Автор

I actually love classic Python slicing so the code can be very straightforward =)

UNIVERSE
Автор

Will you continue the series ? Amazing work ! Love your content

santangelx
Автор

can you please attach the challenge.c file in the github rep or anywhere else?

lanadweikk
Автор

Perhaps I'm going blind, but where's the challenge binary to download?

sloughpacman
Автор

If i not wrong then you are intigriti member ??

lostInSocialMedia.
Автор

For a manual way you could use mkfifo. And in another terminal do this `echo -e "\xde\xad\xbe\xef" > mypipe`

AfterDarknes
Автор

Can i use pwntools to connect gdbserver? I tried 'pwn.gdb.attach((ip, port))' but it was not work

wellmarry