How to Exploit a Buffer Overflow Vulnerability

preview_player
Показать описание
In this video I demonstrate how to exploit a buffer overflow vulnerability. We will leverage this vulnerability to execute shellcode and pop a shell! In this video we reverse engineer the binary and step through the process of discovering and building a working exploit.

00:00 Introduction
00:55 Initial Triage
4:58 Static Analysis in Ghidra
14:18 Analysis Overview
14:32 Crashing the Binary
15:38 Debugging the Binary
16:00 Finding Main in GDB
17:00 Crashing the Binary in GDB
19:22 LEAVE/RET Instruction Explanation
22:00 Finding the Offset
24:28 Overwriting RSP
28:41 Executing Shellcode (Attempt 1 lol)
29:47 Executing Shellcode (Attempt 2!)
32:01 Examining Local Exploit Code
33:00 Running Local Exploit
33:48 Running Remote Exploit (Popping Shells!)
34:06 Grab flag
34:14 Conclusion

Download the binary here:
The binary is password protected: hackthebox

Follow me on social media:

Don't like videos? Check out my blog:

#reverseengineering #bufferoverflow #reversingwithbailey
Рекомендации по теме
Комментарии
Автор

Are you all disappointed in Batman as well or am I the only one lol? If you have any questions, comments, concerns leave it down in the comment section below! If you have any challenges you would like me to try or any tutorials you would like to see let me know and I'll get to it as soon as I can! Thank you for watching!

jaybailey
Автор

here from reddit. Nice video :) In the first 20 seconds, i was "man you're talking too quickly!" then i realised i just think badly and comprehend too slow. I wish i had the keyboard skills that you have, let alone knowledge of ASM and being able to follow those mem addresses and.. well basically everything. Very Impressive. NO HOMO!

Palmit_
Автор

Damn this was really cool! x64 addresses are scary!

DHIRAL
Автор

👏🏾👏🏾 Cool video! Haha We are going to be Batman today.😂

Tyreselynn