@Aaron please don't stop making such great videos. You are explaining in a very simple language that is easy to understand. Looking forward to more videos on Security.
if we don't have a canary and we'd use console input to override a buffer, wouldn't the new return address we're injecting need to contain only characters that we write into the console? or can you type arbitrary bytes?
@Aaron Yoo I we populate the stack canary with a random number generator hardware for every boot there is no possible way to find the number in stack canary.
As explained in video, the canary's bytes brute force opportunity provided by auxilary service with linux's fork functionality. That's means, it's possible to prepare N subprocess of a target software with the same canary number (by forking children from parent process). Exactly 1024 forks in worse case enough to guess the canary.
Cute videos. If weren’t an asian male, I would maybe subscribe. Resided in east asia a long while and tired of jealous asian males hating on THE PLAYER, so I am not subscribing now though.
this was the most simplified explanation I found till date. Please keep up the work.
@Aaron please don't stop making such great videos. You are explaining in a very simple language that is easy to understand. Looking forward to more videos on Security.
this channel is like a precious gem
maybe one of the greatest videos i've ever seen
okay i actually feel more knowledgeable after watching this that's crazy
its actually reduced a bit because there's a null byte to prevent functions that print null-terminated strings from leaking it
you made it really easy to understand, thank you
A baby could learn to do this with your video. Keep these coming man!!!
awesome explanation with useful infos about it thanks man
You need to make more videos!!!
So easy to understand, and we’ll explained
That was really easy to understand explanation!
Thank you!
I just discovered your channel and you deserve more views !
Great explanation with cute figures, thanks!!!
You are intelligent and talented!
Keep it up man, loved the video
A well structured video. Good job.
An amazing video! Thank you!
Just recently found this at the same time that I started learning about solving pwn challenge and binary exploit. Your video is really good man.
Awesome. Your channel is so underrated, I pray to the algo gods.
Hey man, I know I am a year late, but youre goated, you explain everything so well. Thank you, you are saving me in my software security class
The animation and the explanations are superb!. Keep it up!
This is a very good content! Your videos really help people to understand more about computers.
Very good video👌
Dang man these videos are super underrated. You should do more at some point, people will find this stuff soon
Great explanation along with smooth animations
❤
Great video man
just WOW! amazing piece of work, keep doing it!!
Wow this was so easy to understood, I nailed my midterm because of this!
Simple explanation and great animations! Plus the smooth voice makes this video actually really good.
what a cool explain is this !!
Great content
it's so easy to understand thank u so much
Woah!! Really easy to understand this, thankyou so much for this video. Hope to see more video from you
great job!
Thank you so much!! Especially for the exploit part!
Great man! Simple and useful.. Thanks! :)
you have a great voice for narration
Thanks for such good explanation ❤️
Fantastic
Start uploading more and more videos. The algorithm will eventually push your channel forward. Trust me
you explained it perfectly
if we don't have a canary and we'd use console input to override a buffer, wouldn't the new return address we're injecting need to contain only characters that we write into the console? or can you type arbitrary bytes?
3:58 i think that 4 billion needs an extra ++
good video
it's helpful!
@Aaron Yoo
I we populate the stack canary with a random number generator hardware for every boot
there is no possible way to find the number in stack canary.
As explained in video, the canary's bytes brute force opportunity provided by auxilary service with linux's fork functionality. That's means, it's possible to prepare N subprocess of a target software with the same canary number (by forking children from parent process). Exactly 1024 forks in worse case enough to guess the canary.
See you at 1M subs I guess..
Don't forget this comment though.
Plz cover stack leaks 🙌
Brilliant
Good video, but I didn't get, how can we test byte by byte in the real world
best best
This is someone from 2024 your explanation are the simplest I've seen why did you stop
C++ devs will do everything just to not having to use rust (warning: joke)
Old habits die hard 😉
zhina
Cute videos. If weren’t an asian male, I would maybe subscribe. Resided in east asia a long while and tired of jealous asian males hating on THE PLAYER, so I am not subscribing now though.