Developing an intuition for binary exploitation - bin 0x20

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ต.ค. 2024

ความคิดเห็น • 88

  • @MeshX93
    @MeshX93 7 ปีที่แล้ว +77

    Amazing video!! It really takes away the fear of this topic. This explains perfectly that you should not learn all those techniques. You should try to understand how exploitations works in general. Keep it up LiveOverflow ;)

  • @retfede
    @retfede 7 ปีที่แล้ว +7

    Bravo 👏 this is a masterclass. It took me about 25 minutes to finish the video because I kept rewinding it to understand some concepts and I still have some question which I have to look into but I'm way to tired right now; regardless of that I felt I had to take the time to congratulate you on this piece of art.
    Thanks for sharing so much knowledge 🙏

  • @niclaskron3384
    @niclaskron3384 7 ปีที่แล้ว +2

    as matter of fact this is actually one of the more informative videos - this is actual knowledge, other videos are more of "you can do like this or that". keep up man :D

  • @gregorqu
    @gregorqu 2 ปีที่แล้ว

    I've been looking for this kind of summary for 2 months now. Great work, thank you!

  • @0xAdvait
    @0xAdvait 7 ปีที่แล้ว

    Great video as always.About time someone made a video on this one.This is why we spend countless hours on debugging/analysis, so we can finally develop that intuition/aptitude.

  • @StephenGillie
    @StephenGillie 7 ปีที่แล้ว +11

    Lost it at the DHMIS reference. Masterful.

  • @nikt7585
    @nikt7585 3 ปีที่แล้ว

    Finally somebody that explains the Why behind the What! Great video!

  • @asdfasrfsradfsdafwefdsfsdc2749
    @asdfasrfsradfsdafwefdsfsdc2749 7 ปีที่แล้ว

    Your videos were always amazing, but they're still somehow getting even better. Please don't ever stop doing them

  • @sh2493
    @sh2493 6 ปีที่แล้ว

    I never understood binary exploitation before but i now know whats behind the scenes Thanks LiveOverflow

  • @arjungu5655
    @arjungu5655 5 ปีที่แล้ว +1

    Before watching this video i was also scared of binary exploitation and now i have a thought that i can somehow learn it. Thank you LiveOverflow. Happy Hacking!!!

  • @mehdihachimi9624
    @mehdihachimi9624 4 ปีที่แล้ว

    Learning to write Shellcode, this is exactly what I needed to hear !

  • @Aliferopoulos
    @Aliferopoulos 7 ปีที่แล้ว +13

    Amazing, as always!

  • @rpit3b595
    @rpit3b595 5 ปีที่แล้ว +1

    @liveoverflow thanks for the video it was really helpful we learned a lot but when are you planning to do another advanced series introducing new way of hacking in the modern world it maybe helpful or maybe just a reference so that i can do it myself to see how much i have improved in binary exploitation

  • @RR-qx8zo
    @RR-qx8zo 7 ปีที่แล้ว

    This first time I know the concept of binary exploitation, thanks!

  • @otesunki
    @otesunki 3 ปีที่แล้ว

    It really clicked for me when I wrote a bootloader, and realised THE STACK WAS OVERWRITING IT, and found out the stack, heap, and code are all in the same place, RAM.

  • @roguesecurity
    @roguesecurity 7 ปีที่แล้ว

    Awesome video once again by LiveOverflow. You are amazing. Really love watching your videos. The are very informative. Thanks man, and I respect your dedication and hard work.

  • @sykae
    @sykae 7 ปีที่แล้ว +1

    For some reason, render of the Premiere Pro was just the record. Anyway reuploaded it, thanks for telling :)

    • @AquaFX
      @AquaFX 7 ปีที่แล้ว

      yep

    • @ko-Daegu
      @ko-Daegu 6 ปีที่แล้ว

      Codeinstein
      Why did you stop uploading

  • @alterego5985
    @alterego5985 6 ปีที่แล้ว

    This should be the first video in the series

  • @kuksenko116
    @kuksenko116 7 ปีที่แล้ว +2

    Thanks for that Great simplified explanation. I think what i would like to see is how you would go about seeing what is being written and read from memory. Is there a specific program you use? Or is it brute-force until it works?

    • @xp0739
      @xp0739 4 ปีที่แล้ว +1

      I think here's when a debugger comes in. You can stop a program's execution and then examine the memory using a debugger in order to see what's written or changed.

  • @ravivashatkar5585
    @ravivashatkar5585 4 ปีที่แล้ว +1

    You explained just the right thing ! Great video.
    I would like to know how multiple programs can use stack at the same time. How do multi- processing and stack work interactively ?

    • @EvilSapphireR
      @EvilSapphireR 4 ปีที่แล้ว +1

      Every process has their own stacks inside of their virtual address space and they never interact.

  • @moeg3457
    @moeg3457 5 ปีที่แล้ว +3

    Thats overflowed my memory

  • @hanneshertach8013
    @hanneshertach8013 7 ปีที่แล้ว +1

    Where did you find that Elf walkthrough graphic? That looks really helpful, would be nice to have as an image.
    (Talking about 4:10)

    • @lijnk
      @lijnk 7 ปีที่แล้ว

      search for corkami's github. it's part of a series of file formats diagrams

  • @aziz0x00
    @aziz0x00 2 หลายเดือนก่อน

    Amazing! Thank you!!!❤❤

  • @cyancoyote7366
    @cyancoyote7366 7 ปีที่แล้ว +1

    Thanks for making these videos, they cheer me up everytime!

  • @OmarTriguiTn
    @OmarTriguiTn 7 ปีที่แล้ว

    Thumbs up man ! Great work, especially the impressive quality of the presentation :)

  • @tuanlinhdao3389
    @tuanlinhdao3389 7 ปีที่แล้ว

    Really interested.
    Thanks you alot!!!
    Waiting your next tutorial

  • @desheen5056
    @desheen5056 7 ปีที่แล้ว

    this is very good awesome and very creative , now i understand more and more and more , i loved it please MORE .

  • @elikelik3574
    @elikelik3574 4 ปีที่แล้ว

    10.52 what??? not useful information??? Man u r kidding. It has to be the first video on this playlist. Can you imagine how it was difficult to understand when u were using something like EIP, EBP and so on. I had to stop the video and go to search for that stuff and then come back. Thanks for your videos, I really appreciate it. Peace.

  • @rastakiwi3899
    @rastakiwi3899 7 ปีที่แล้ว

    Do you have some artist background ? I mean all your videos are well illustrated and it's cool :D

    • @LiveOverflow
      @LiveOverflow  7 ปีที่แล้ว

      +Rastakiwi Roubal lol no. Tracing a lot of stuff

  • @founderofisis6627
    @founderofisis6627 7 ปีที่แล้ว

    This is amazing. Thank you for your pro educational efforts.

  • @kevyo897
    @kevyo897 7 ปีที่แล้ว

    Exactly what I wanted to see. Great :)
    Thanks

  • @MrHatoi
    @MrHatoi 6 ปีที่แล้ว

    My favorite episode, "bin "

  • @agnusxendis8356
    @agnusxendis8356 7 ปีที่แล้ว

    6:27 Not exactly - ESP dictates where the top of the stack is, so if it points in the middle of your code section then this is where the stack is.

    • @LiveOverflow
      @LiveOverflow  7 ปีที่แล้ว

      +Agnus Xendis that's basically what I said. No?

  • @sontapaa11jokulainen94
    @sontapaa11jokulainen94 4 ปีที่แล้ว

    2:18 0x3 points to the 3rd instruction? Shouldn't it oint to the 4th, because 0x0 is first 0x1 is second 0x2 is third 0x3 is fourth? I am confused.

  • @jonmartin7628
    @jonmartin7628 5 ปีที่แล้ว

    Awesome video. Greatly explained

  • @実辛島
    @実辛島 5 ปีที่แล้ว

    For me little techniques are difficult like sending interrupt after executed system() or sending binary over ssh after password authentication. Where did you get those knowledge?

  • @UsmanAbdulHalim
    @UsmanAbdulHalim 7 ปีที่แล้ว

    Any plans for solving crackme? ARM or any other arch like MIPS
    .

  • @sukkyatlife
    @sukkyatlife 7 ปีที่แล้ว

    Thanks for these videos :) great content and easy to understand. Great Job!!

  • @AzaTht
    @AzaTht 7 ปีที่แล้ว

    It made sense; Thought I still feel it's over my head

    • @ELYESSS
      @ELYESSS 7 ปีที่แล้ว

      For me it was the complete opposite, this video was easy but his other videos flew over my head
      but probably because I once tried to write a bootloader and a tiny os using assembly, but never used the tools he uses on linux (sorry everybody, I am a widows user)

    • @Matt-ir1ky
      @Matt-ir1ky 7 ปีที่แล้ว

      Come to the not-darkside

  • @YGmagnum
    @YGmagnum 7 ปีที่แล้ว

    super cool! Thank you!

  • @manojprabhakaran5835
    @manojprabhakaran5835 ปีที่แล้ว

    thanks for this video

  • @geekgeek8453
    @geekgeek8453 7 ปีที่แล้ว

    Your content is so awesome that one video per week is not enough. Let me be selfish and suggest you should go back to 2 videos per week :).

  • @makealemonade
    @makealemonade 3 ปีที่แล้ว

    Please more videos like this or learning resources. Please /\

  • @manvendrasingh1439
    @manvendrasingh1439 7 ปีที่แล้ว

    Thanks a lot for such amazing videos.

  • @mohammadahmedragab837
    @mohammadahmedragab837 2 ปีที่แล้ว

    thank you so much.
    Please what is the recommended resources for absolute beginners to learn assembly language of Intel x86, and learn binary exploitation?

    • @xanaxity
      @xanaxity 6 หลายเดือนก่อน

      opensecuritytraining lectures are good.

  • @WoolieOG
    @WoolieOG 7 ปีที่แล้ว

    liked it, also good job with all these images =)

  • @fosatech
    @fosatech 6 ปีที่แล้ว

    Awesome job! Keep it up!

  • @manvendrasingh1439
    @manvendrasingh1439 7 ปีที่แล้ว

    one thing i am not able to understand that in most operating systems an stack may not have a contiguous block of memory in physical ram. in that can how can a overflow attack can work ?

    • @LiveOverflow
      @LiveOverflow  7 ปีที่แล้ว +2

      we don't care about where the stuff is in real memory. If it's in RAM or swapped on disk, or if monkeys write it on papers. Our programs operate on virtual memory and that looks like continuous block of memory. The kernel and hardware makes sure to abstract away the true underlaying physics for us.

    • @manvendrasingh1439
      @manvendrasingh1439 7 ปีที่แล้ว

      let's say for example the value of ebp and esp for stack is 0x100 and 0x96 and return address is at 0x104 so if i have to overwrite the return address then i will have to supply 12bytes of data insted of 4. but if my return address is mapped to 0x1000 in the actual physical address and esp is to 0x2000 then how can someone able to overwrite the return address with only 12 bytes of payload when the actual difference in memory for them is 1000 bytes?

    • @LiveOverflow
      @LiveOverflow  7 ปีที่แล้ว +2

      like I said. We don't care about the actual physical RAM address. no program ever deals with ram directly. We have absolutely no idea what the real address is. All you deal with is the virtual memory space... A part of the CPU, the Memory management unit, translates the virtual address to real address.
      even if we knew the real RAM address, we could never access it. Our programs never use real addresses.
      all we do is use virtual addresses, so 0x100. and the MMU will translate it on hardware to 0x2000. we never ever see the real address.

    • @manvendrasingh1439
      @manvendrasingh1439 7 ปีที่แล้ว

      thanks for the reply.

  • @amargaikwad8408
    @amargaikwad8408 5 ปีที่แล้ว +1

    This all went above from my head😂😂

  • @lopo8000
    @lopo8000 3 ปีที่แล้ว

    Has anyone ever made a hack to stop bullets in mid air???

  • @gameglitcher
    @gameglitcher 5 ปีที่แล้ว

    This video had not got near enough love

  • @kanakocupcake6106
    @kanakocupcake6106 4 ปีที่แล้ว

    This is so good!

  • @alkeryn1700
    @alkeryn1700 6 ปีที่แล้ว

    I'm wondering if it is enough to exploit real world application
    i mean sure i know how to exploit vulns
    but what do you do when there just isn't a vuln, that's kinda what i'm wondering

    • @LiveOverflow
      @LiveOverflow  6 ปีที่แล้ว +1

      when there is no vuln, there is no vuln :P

    • @alkeryn1700
      @alkeryn1700 6 ปีที่แล้ว

      Rip

    • @ai.simplified..
      @ai.simplified.. 5 ปีที่แล้ว

      Real hacker , will find a vul

  • @dennisbarzanoff9025
    @dennisbarzanoff9025 6 ปีที่แล้ว

    Awesome vid dude

  • @H32-u7d
    @H32-u7d 6 ปีที่แล้ว

    So in a buffer overflow nothing overflows ?

    • @LiveOverflow
      @LiveOverflow  6 ปีที่แล้ว

      eh? The buffer overflows

    • @H32-u7d
      @H32-u7d 6 ปีที่แล้ว

      LiveOverflow oh understand now . I though you just wrote on a single address , the top of the stack .

  • @techitow
    @techitow 6 ปีที่แล้ว

    great video!!

  • @housemusic325
    @housemusic325 6 ปีที่แล้ว

    Where i can get the image at 4:20 ?

    • @fosatech
      @fosatech 6 ปีที่แล้ว

      ih1.redbubble.net/image.15341732.6212/flat,800x800,070,f.u1.jpg

  • @KeithMakank3
    @KeithMakank3 6 ปีที่แล้ว

    "Well defined, deterministic" ... okay okay lets not get too crazy here lol

  • @gameglitcher
    @gameglitcher 5 ปีที่แล้ว

    10:37 XD XD XD
    Translate Simplified Chinese to English, Or just use English in google translate ;) I know English is not your native language, but i found this quite funny :3
    fung sh-way
    fung -like [func]tion - but g sound instead of c
    schway
    [sch] kind of like [sh]eep
    way, as is.

  • @lmarloe
    @lmarloe 7 ปีที่แล้ว

    cool

  • @azeez2006
    @azeez2006 4 ปีที่แล้ว

    This remembers me to the time where i manage to develop my first exploit for SLmail.exe :b In Terms of achieving my OSCP Certification!

  • @yasmeencerny4660
    @yasmeencerny4660 6 ปีที่แล้ว

    its again become un-understand able thing

  • @sunilkumshah8704
    @sunilkumshah8704 3 ปีที่แล้ว

    Channels like this shouldn't be public , else we won't be able to flex 😂

  • @cwdecwcsdfc-ce7br
    @cwdecwcsdfc-ce7br ปีที่แล้ว

    German accent

  • @DickSvensson
    @DickSvensson 7 ปีที่แล้ว

    Great content as usual! thanks for spending so much time on creating great content and sharing with the community.