DANGEROUS C Functions gets & strcpy (PicoCTF 2022 #04 buffer-overflow0)

preview_player
Показать описание
Help the channel grow with a Like, Comment, & Subscribe!
Check out the affiliates below for more free or discounted learning!

📧Contact me! (I may be very slow to respond or completely unable to)
Рекомендации по теме
Комментарии
Автор

I was at that part in my Security+ chapter about buffer-overflow and I was looking for an example of what it really did in C. Thanks man !! :)

jlm
Автор

Maybe putting -fstack-protector when compiling would have worked? Not sure

JBlly
Автор

Thank you John, every time I watch one of your videos I always learn something new :)

mrnord
Автор

Dude, following along right with you, even going ahead now until I get stuck! Please keep going, this is great and I appreciate you so much!

jpiercelt
Автор

Haha I'm a noob at these CTF challenges and had troubles solving this one for some reason. Looking through it with your guidance I'm like "Wow I'm an idiot, it was so simple" lol

windows
Автор

Thanks John. We appreciate how you thoroughly explain everything and keep it simple at the same time. You're a rockstar!!

greyether
Автор

These videos are so awesome. Thanks so much John

Talyzeni
Автор

Super cool series, always a pleasure to watch them! Keep it up!

VAKAMA
Автор

3 ways to fail the computer systems course I did ~20 years ago: 1) cheat 2) do way too little adequate work 3) use gets()

logiciananimal
Автор

Loving this series, John. Please finish it!

KGAD
Автор

it seems to be a kali linux thing having no stack-protector when building with gcc, as it works on my machine (ubuntu)

wChris_
Автор

you already know it but let me tell you one more time YOU ARE AWESOME.

kaleabalemayehu
Автор

You the best John, thanks a lot for these material and your explanations,

You are a master mind my friend

tuxmaster
Автор

I wanted to subscribe, but I've completely forgotten that I already was. Anyway, thanks for another informative video!

richardStretcher
Автор

Thank you for all the beginner-friendly content
A question as an absolute newbie into binary: only an input of length>=20 causes the SIGSEGV, i.e. it doesn’t happen with say 17. Is there a way to know or estimate how many more bytes I need?

henrym
Автор

sigsegv stands for signal segmentation violation

cqundefine
Автор

6:34 a minor correction: the char array buf1 is 100*sizeof(char) Bytes long

MiguelDevOps
Автор

i think the stack smashing wasnt detected probably the way gcc was compiled, its default could have been -fno-stack-protector, so default build task will never include a canary

anmoldeepsingh
Автор

I think strcpy is the most used function to demonstrate bufferoverflows.

zer
Автор

Oh the days I coded in C/C++, flush of output buffer is not guaranteed without the flush

TehPwnerer