목록LiveOverFlow (40)
Security_RNRF
15. Doing ret2libc with a Buffer Overflow because of restricted return pointer - bin.0x0F : Content -> Gadget -> ret2libc -> Find string in libc : : stack6(C code)(/opt/protostar/bin/stack6) #include #include #include #include void getpath() { char buffer[64]; unsigned int ret; printf("input path please: "); fflush(stdout); gets(buffer); ret = __builtin_return_address(0); if((ret & 0xbf000000) =..
14. First Exploit! Buffer Overflow with Shellcode - bin.0x0E : Content -> Buffer Overflow with shellcode -> shellstorm -> debugging shellcode : Stack5 is a standard buffer overflow, this time introducing shellcode. : How do I get to the root shell from a program that has no special features? : stack5(C code)(/opt/protostar/bin/stack5) #include #include #include #include int main(int argc, char *..
13. Buffer Overflows can Redirect Program Execution - bin.0x0D : Content -> gdb, objdump -> python -> stack layout : stack0(C code)(/opt/protostar/bin/stack0) #include #include #include int main(int argc, char **argv) { volatile int modified; char buffer[64]; modified = 0; gets(buffer); if(modified != 0) { printf("you have changed the 'modified' variable\n"); } else { printf("Try again?\n"); } }..
12. First Stack Buffer Overflopw to modify Variable - bin.0x0C : Content -> stack layout -> local variables on the stack -> buffer voerflow to overwrite moemory : This level introduces the concept that memory can be accessed outside of its allocated region, how the stack variables are laid out, and that modifying outside of the allocated memory can modify program execution. : stack0(C code)(/opt..

5. Reversing and Cracking first simple Program - bin.0x05 : Content -> gdb(GNU Debugger) -> Control-Flow -> changing behaviour - cracking the program : github install -> sudo apt-get install git : “license_1” Download -> git clone https://github.com/LiveOverflow/liveoverflow_youtube.git : gdb ./license -> set disassembly-flavor intel -> disassemble main -> 0x00000000004005bd : push rbp 0x0000000..

4. How a CPU works and Introduction to Assembler - bin.0x04 : Content -> CPU registers -> Arithmetic Instructions -> Moves, Jumps, Branches and Calls -> Stack with PUSH/POP Tips. It is strongly recommended that you read this article. -> https://sockpuppet.org/issue-79-file-0xb-foxport-hht-hacking.txt.html : “hht hacking” of content --[ assembly programming ]----------- Assembly language is more ..
3. Writing a simple Program in Python - bin.0x03 : Content -> Using “vim” editor -> Introduction to the “python” programming language -> Updating the system : Python is an “interpreter language”. : Python runs sequentially from beginning to end of the file. : Tips. You can open the two codes by comparing them. # “-O” option. -> vim -O matrix.c matrix.py : Tips. Options to fill in the spaces in t..
2. Writing a simple Program in C : To find a security problem with the software, you need to understand how the software is written. : It is also very useful to explore different language programming to understand the differences. : Content -> Installing vim editor : sudo apt-get vim : ESC -> “:” -> w(=save)q(=quit)!(force) : ESC -> “:” -> syntax on : ESC -> “:” -> set number : simple C Code int..
1. Introduction to Linux - Installation and the Terminal : Content -> Install Linux (Ubuntu) in a VM -> Introduction to the command-line -> Commands: ls, cd, mkdir, touch, man, sudo, … : Building your own system through “archlinux” is also a good experience. : Install the Ubuntu Linux -> Why is it Ubuntu? so easy. : Tips. Linux Displays Option -> xrandr —addmode Virtual1 1920x1080 -> (Displays a..