Buffer Overflow & Binary Exploitation with Radare2 | P21 | CTF Walkthrough

preview_player
Показать описание
In this video walk-through, we covered another example of a vulnerable binary to buffer overflow vulnerability. The binary has NX enabled to prevent code execution in the stack but our goal was to control the execution flow and redirect it to the "winner" function to print the flag. We generated a pattern to cause a segmentation fault then we used the address of the "winner" function so that the RIP register points to it after it hits the segmentation fault. This was part of HackTheBox Reg Intro to Binary Exploitation track.
**********
Receive Cyber Security Field, Certifications Notes and Special Training Videos
******
Writeup
HackTheBox Reg
********
Patreon
Instagram
Twitter
Facebook
LinkedIn
Website
Backup channel
My Movie channel:
******
Рекомендации по теме
Комментарии
Автор

السلام عليكم هل استطيع ان احصل علي مذكرات volatility لان حالي مش يتحيلي اني اشتريهم لو سمحت

Ahmed-fiqm
Автор

Would love to know your setup, becase first: my gdb updated in 2024 has no pattern command
second: it does not dump memory pointer information after seg fault

tentra