ขนาดวิดีโอ: 1280 X 720853 X 480640 X 360
แสดงแผงควบคุมโปรแกรมเล่น
เล่นอัตโนมัติ
เล่นใหม่
This is so interesting, and you are very good at explaining! From the bottom of my heart, thank you for these free lessons!
Thanks for this tutorial. Now I know how return to libc attack worked. It helps a lot!
I FINISHED MY CYBERSECURITY HOMEWORK WITH THIS ONE 🗣️🗣️🔥🔥🔥‼️ ARIGATOU GOZAIMASU 🙏😇✨🌸
i really wanna hug that man, thanks a lot
Excellent. Thanks very much for the video. Very useful!!
10:56 why should we offset 4 bytes on the stack?
11:47 why exit function will get called after system function completion?
so if I understood this correctly, this attack would work on non-exec stack but It would fail for canaries because before returning the canary value would be checked. Am I right?
Thank you sir for this clear explanation !
thanks you very much for this video
Thank you sir!
thanks a lot!!
thank you sir...
This is so interesting, and you are very good at explaining! From the bottom of my heart, thank you for these free lessons!
Thanks for this tutorial. Now I know how return to libc attack worked. It helps a lot!
I FINISHED MY CYBERSECURITY HOMEWORK WITH THIS ONE 🗣️🗣️🔥🔥🔥‼️ ARIGATOU GOZAIMASU 🙏😇✨🌸
i really wanna hug that man, thanks a lot
Excellent. Thanks very much for the video. Very useful!!
10:56 why should we offset 4 bytes on the stack?
11:47 why exit function will get called after system function completion?
so if I understood this correctly, this attack would work on non-exec stack but It would fail for canaries because before returning the canary value would be checked. Am I right?
Thank you sir for this clear explanation !
thanks you very much for this video
Thank you sir!
thanks a lot!!
thank you sir...