목록LiveOverFlow (40)
Security_RNRF
35. Buffer overflwo on a modern ststem impossible? stack0: part 1 - bin.0x21 : "protoostar" has been completed -> That means you are familiar with the basic knowledge of how binary exploit works. -> Now, it's not easy anymore. -> This is because we generally try to copy the source code and compile it on our own modern Linux machines. -> So I think it will be interesting to introduce and exploit ..
34. Developing an intuition for binary exploitation - bin.0x20 : We are already trying to understand how to exploit the program. -> Various examples were covered in previous videos, including memory corruption, default buffer overflow, heap exploitation and format string. -> And many would think it's already quite complicated. -> But put it in the context of history and we are still 16 years fro..
33. Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195 : Searching for Redditts found a new "CTF" for beginners. : PwnerRank.com -> useful dirty_cow -> Change pwn1 to root privilege using dirty_cow : Let's use our proof of concept exploit and test it to see if it works. -> Therefore, you can copy and compile this code into a "tmp" file. -> Test whether you can overwrite a n..
32. [Live]Remote oldschool dlmalloc Heap exploit - bin.0x1F : Very long Time 2:33:15, Next time…
31. Remote format string exploit in syslog() - bin.0x1E : "final1" has a type string vulnerability that can be exploited remotely. : Like all previous problems, the program runs as a network daemon in this case. -> Port 2994 is defined. -> Therefore, you can use "netcat" to connect to this service, which displays the "final1" prompt. -> nc 127.0.0.1 2994 [final1] $ ping # this is called a prompt..
30. First remote root exploit - bin.0x1D : I learned how to debug "final0" from the "0x1C" video. And the first remote buffer overflow exploit could be completed. -> In the "0x1C" video we wrote Python "one-liner" to interrupt the process and the command pointer was hexadecimal. -> The "fffg" of "ASCII," now knows which character takes precedence over which of the stack's return po : C Code(/opt..
29. Linux signals and core dumps - bin.0x1C : The "final" level is more developed and is at a very easy "pwnable" level. : Let's look at "final0". -> Network settings are essentially the same as previous video, so you should become familiar with these user-defined features. -> Therefore, the client calls this function when it connects to this service running on port 2995. -> "get_username()" Thi..
28. Socket programming in python and Integer Overflow - bin.0x1B : The networking level of "protoostar" is not really relevant to security. -> Therefore, it is good to do simple network programming first. -> socket programming in python -> prerequisite -> TCP, sockets, ... episode bin 0x19 and 0x1A -> And it is good to practice and solve the problem and complete the series. : The same goes for t..
27. TCP Protocol introduction - bin.0x1A : Content -> Netcat -> WireShack -> strace : After performing the first networking task in the "0x19" video, the server was first transformed. -> The port received and connected to the port using "netcat". -> Let's go deeper into this video and look at the TCP protocol. -> You will see what sending packets means. -> We use "netcat" and in many parts of ac..
26. First steps into networking with net0 from exploit.education protostar - bin.0x19 : Now we move on to networking issues in the Explorers exercise. -> Some basics need to be set first. -> In the description, you must convert the string to a small endian integer : C Code(/opt/protostar/bin/net0) #include "../common/common.c" #define NAME "net0" #define UID 999 #define GID 999 #define PORT 2999..