- 14
- 3 975
Leigh Trinity
Приєднався 26 тра 2024
Demo of how a simple buffer overflow works.
Simple demo for my students in Ukraine of how a function like strcpy can overwrite adjacent memory leading to a buffer overflow. Building blocks of exploit development. #hacker #zeroday #infosec
Переглядів: 25
Відео
Using environmental variables to buffer overflow a small buffer
Переглядів 7010 днів тому
Stack exploitation basics game
Переглядів 25715 днів тому
Game to practice learning stack creation, and overwriting variables on the stack.
Stack creation and finding variable within memory
Переглядів 46620 днів тому
quick 12 minute video displaying the creation of a stack and how varibales are stored within. Important first skills to linux exploitation development
Exploit development basics. Bypassing 32 bit ASLR via bruteforce method
Переглядів 33923 дні тому
Finding and overwriting variables on the stack.
Переглядів 115Місяць тому
Using GDB to have fun with a small C program.
Bypassing Data execution prevention
Переглядів 1,3 тис.Місяць тому
Simple example of calling functions from libc library to bypass DEP.
Bypassing Data execution prevention
Переглядів 41Місяць тому
simple example of calling functions from libc in lieu of executing anything on the stack. More to come!
Vanilla buffer overflow basics
Переглядів 834Місяць тому
with ASLR turned off. A simple demo of a buffer overflow attack. More advanced topics to come.
Using write syscall in 32 bit assembly
Переглядів 1242 місяці тому
Brief example of using write syscall. A basic knowledge for payload creation in future videos.
Stack creation. Using GDB to find variables within the stack for simple buffer overflow exploit.
Переглядів 982 місяці тому
Messing about with Lokibot trojan
Переглядів 1005 місяців тому
2024 06 02 12 43 51
Переглядів 1245 місяців тому
Basics of API hooking VirtualAlloc and VirtualProtect to dup payloads from memory
You turned off the mic on minute 2:36 but I was still a great video keep doing this is awesome. Sub and like.
Thank you so very much!
Want to learn more about penetration testing
stay tuned
Nice information
thanks!
Amazing as usual!
You're the best! Thanks my friend!
Thank you Leigh 🍒🍒🍒
You are so welcome!! =0)
Love the videos but this one has the camera cut from the commands :/ The zoom level doesn’t allow us to see the commands
I'm really enjoying seeing these videos. Messing with the stack is so much fun once you understand it. Thanks for the video.
That’s is great. Keep it up please.
🤟😎🤟 Thanks for the explanation 🍿👍
My pleasure. Helps me study and relearn.🙂
I like your explanation of the stack. Well done. I am also wondering why you are running Linux in a VM rather than running native.
Thank you my friend. I do a lot of malware research and most of my work is vm. I needed a older 32 bit system so downloading a old unbuntu worked best.🙂
@@LeighTrinity Hey, good luck in Ukraine. Слава Україні! (Slava Ukraini) 🙂
@@chrismcgowan3938 Thanks brother!
Nice
Thanks!
Randomly found your channel, and it's GREAT to see someone who also knows assembler. Keep it up, I miss actual coding/exploiting content done in a real language.
Thank you so much! I adore assembly. More to come! Thank you so much for the comment!
❤❤❤❤❤❤
💌
Great video! Very instructive, the way you walked through all things to get it done. Keep it coming, please!
Thank you so very much! I enjoy sharing this stuff and comments like this make me wanna share more.🥰
Great tutorial Leigh...nicely explained....looking forward to the next one!
Thank you! Slowly figuring this stuff out.☺
Thank you for the video. Something you might find useful: there is a lot of wasted screen space in the video, which I found to be a bother. We can see the Windows task bar at the bottom, the linux one on the left, the VirtualBox options at the top, and you spent a lot of time typing in small windows. I think a solution would be to stream the fullscreen VirtualBox window directly in obs. If you want to show pictures / other stuff from Windows you can always stream that window in obs (it's easy to add another image source in obs and to put it to the front when you need to then discard it). You can also add you pictures to the virtual machine and show them in Ubuntu (send them from windows to the VM with VirtualBox's shared folder). Also, you can disable the task bar in Ubuntu and maximize your terminal windows when possible (or just make them bigger). Last thing: I think it is great to show your face to make the presentation more personal but the top left corner is where code tends to be by default. Maybe put your webcam in the top right corner instead?
very constructive! Thank you!
Okay Great
great stuffs mam really liked it
Thank you! Glad you enjoyed!
Are you a pen tester
Red team 100%
@@LeighTrinity was your background in engineering
@@keylanoslokj1806 No Reversing is something I got into last year and fell in love.☺
thank you, it was very helpful for me
Glad to share!!
interesting and valuable , thanks for the demo ...
My pleasure! Thank you!
As a Red Teamer getting into exploit dev, thanks for the content!
Thanks brother! Glad to help fellow red teamers.🙂
Do you have a write up anywhere about this simple attack? Nice video!
thank you so very much! No I'm just starting to put together a online presence! Soon!!
11:14 Is there any particular reason the return address of 0xbfffff430 was chosen instead of the next one?
No anywhere on the nops is fine!
Thanks! Looking forward to your next video!
Ooh!
thanks!!
I did not know you could do that in gdb. I generally just do a stack dump ..... thanks for the lesson
Thank you my friend!!
Awesome demo! I'm excited to learn more from your content
Thank you! Exploit dev is sooo much fun!
Good stuff! Looking forward to the future content. Would have loved a bit more in depth breakdown of that payload, to understand where we're jumping to in order to invoke that shell
Thank you so much! I will 100% do a video on making your own 32 t payload very soon!! Sounds like I need a few graphics. Thank you so much for the feedback!
Great content. Will love to see some exploit development stuff. Cheers.
Thank you! More low level stuff and exploit dev to come.☺
Another excellent video, Leigh!
Thank you! Had fun making it.🥰
Nicely done and explained!
Thank you my friend!
Outstanding! Great explanation
Thank you!! I've been doing a deep dive into this stuff. I think I have the basics.☺