filmov
tv
What is a Stack Buffer Overflow? Exploring How To Exploit the Stack
![preview_player](https://i.ytimg.com/vi/Uttvrv8QNsU/maxresdefault.jpg)
Показать описание
In this video, we'll discuss the basics of software exploitation by beginning with the stack-based buffer overflow. For many, learning how to exploit buffer overflows is the gateway to learning many other exploitation techniques. In addition, you will learn how compilers and modern day operating systems have evolved to mitigate these vulnerabilities.
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
🌶️ YouTube 👉🏻 Like, Comment & Subscribe!
In this demo, we'll use a sample C program to create a vulnerable program. We'll discuss different compiler flags that we have to use to disable some safety features - mainly stack cookies. Then we'll use IDA Pro to investigate the program and map out the layout of the stack. We'll end this video preparing to study the crash in a debugger.
This will be the first of several videos, so stay tuned as we explore the foundations of software exploitation!
Videos in this series:
1:12 The Sample Program
2:10 STRCPY for the Overflow
2:30 How an Overflow Impacts Program Execution
3:06 Smashing the Stack for Fun and Learning
3:30 Compiling Plus the /GS- Flag
4:15 Analyzing in IDA Pro
4:48 Identifying Local Variables in Disassembly
5:20 Identifying Extra Stack Space Usage
7:25 IDA's Stack View
8:26 Cleaning Up the Stack View
9:55 Identifying MEMSET
10:20 Abusing STRCPY
10:45 Getting Ready to Catch the Crash in a Debugger
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
🌶️ YouTube 👉🏻 Like, Comment & Subscribe!
In this demo, we'll use a sample C program to create a vulnerable program. We'll discuss different compiler flags that we have to use to disable some safety features - mainly stack cookies. Then we'll use IDA Pro to investigate the program and map out the layout of the stack. We'll end this video preparing to study the crash in a debugger.
This will be the first of several videos, so stay tuned as we explore the foundations of software exploitation!
Videos in this series:
1:12 The Sample Program
2:10 STRCPY for the Overflow
2:30 How an Overflow Impacts Program Execution
3:06 Smashing the Stack for Fun and Learning
3:30 Compiling Plus the /GS- Flag
4:15 Analyzing in IDA Pro
4:48 Identifying Local Variables in Disassembly
5:20 Identifying Extra Stack Space Usage
7:25 IDA's Stack View
8:26 Cleaning Up the Stack View
9:55 Identifying MEMSET
10:20 Abusing STRCPY
10:45 Getting Ready to Catch the Crash in a Debugger
Комментарии