filmov
tv
Catching a Buffer Overflow with a Debugger - Exploring How To Exploit the Stack

Показать описание
In this video, we'll continue our exploration of software exploitation by walking through how to capture an overflow with a debugger. In this demo, we'll start our vulnerable program in WinDbg, find it's entry point and begin our debug session. We'll then look at how memory is overflown and, finally, capture the instruction pointer to confirm we've taken control!
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
🌶️ YouTube 👉🏻 Like, Comment & Subscribe!
Videos in this series:
00:24 Getting started with a debugger (WinDbg)
1:15 Starting the debug session
1:22 Finding the programs entry point
1:50 ASLR and how it impacts our analysis
2:38 Debugging the program
3:15 Viewing the overflow in memory
4:24 Seeing the overflow in action - after strcpy
5:02 All your EIPs are belong to us
5:43 Troubleshooting your payload
6:13 Next up, stack cookies!
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
🌶️ YouTube 👉🏻 Like, Comment & Subscribe!
Videos in this series:
00:24 Getting started with a debugger (WinDbg)
1:15 Starting the debug session
1:22 Finding the programs entry point
1:50 ASLR and how it impacts our analysis
2:38 Debugging the program
3:15 Viewing the overflow in memory
4:24 Seeing the overflow in action - after strcpy
5:02 All your EIPs are belong to us
5:43 Troubleshooting your payload
6:13 Next up, stack cookies!