Writing a Simple Buffer Overflow Exploit

preview_player
Показать описание
Feel free to follow along! Just a simple buffer overflow walkthrough.

-=[ 🔴 Stuff I use ]=-

-=[ ❤️ Support ]=-

-=[ 🐕 Social ]=-

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Рекомендации по теме
Комментарии
Автор

2014: Really professional and rare videos
2019: 10:43



Please don't stop! We're loving the new LiveOverflow <3

xcffee_
Автор

I was giving a presentation on Buffer Overflows just as this video released! The timing when the notification popped on screen was just perfect hahaha

therudolfgaming
Автор

Just a small note, at 17:45, the syntax "string[a:b]" isn't a list comprehension but is instead string slicing; a list comprehension is instead the syntax "[f(x) for x in iter]".

chezz
Автор

If he streamed this instead...
It'd be a...
Live Overflow
*ba dum tss*

YdenPL
Автор

For the executable shellcode on the stack to work (i.e. not using return oriented programming), you'd have to have an executable stack, which means W^X would need to be disabled.

klightspeed
Автор

I wish myself that when December is over LiveOverflow still uploading videos daily...

solveit
Автор

Loving the new vids! Keep them coming!

rusirumunasingha
Автор

Cool video as always! Thanks for the detailed explanations!

chiabobo
Автор

i just interested in these kind of things, so i have no idea what all these mean, but i'll be back in a few with a more thorough understanding. wish me luck

myczxr
Автор

I'm noticing that since you started pumping videos out daily, those videos also changed in their topics. They're much more beginner-oriented now and are often even a bit clickbaity. I do hope we will see some more advanced videos of you soon, in the same animated style as back then (that was fantastic!), like you used to do. That would make many of your old fans happy

kangalio
Автор

This is EXACTLY what I needed!! Thank you!!!

If anyone sees this that knows of any undergraduate minority male scholarships, please let me know!!!

SWonYT
Автор

@LiveOverflow Thanks to your videos and constantly inspiring us to learn new things. I was able to reverse engineer a feature in WhatsApp. Thanks again for all the videos you have made. They are just awesome.

sumitlahiri
Автор

Why does two %p leak the input buffer address, I wonder. Also, how do you need to change the method if working in a telnet to a remote server where you can't use gdb?

almightyhydra
Автор

very nice [while loop], keep Up the good work

georgehammond
Автор

Can you give a link about that geohot ctf you talked in the video?

tafama
Автор

He got it at the first try, after ten practice rounds and prepared a program for the video. :D

PeetHobby
Автор

You've always put out such good content, and I love it, but despite that, I've never understood how this channel gets so many views, since this subject isn't exactly aimed at a general audience. Are there way more people out there doing security stuff than I think, or are there lots of people who watch without really having a reason to do so?

delphicdescant
Автор

These two videos were like "Memento"

waplet
Автор

Hey I like your videos! Subscribed =)

Did you find your bachelor and masters usefull? Or would you say somebody without a degree (maybe just apprenticeship, and general really good software engineer) has a can get a job in the field as a security engineer / ethical hacking
?

sniGGandBaShoR
Автор

Of the years that I've been watching this channel, I just noticed that your new logo sequence is an animated buffer overflow attack

SWonYT