Leigh Trinity
Leigh Trinity
  • 14
  • 3 975
Demo of how a simple buffer overflow works.
Simple demo for my students in Ukraine of how a function like strcpy can overwrite adjacent memory leading to a buffer overflow. Building blocks of exploit development. #hacker #zeroday #infosec
Переглядів: 25

Відео

Using environmental variables to buffer overflow a small bufferUsing environmental variables to buffer overflow a small buffer
Using environmental variables to buffer overflow a small buffer
Переглядів 7010 днів тому
Stack exploitation basics gameStack exploitation basics game
Stack exploitation basics game
Переглядів 25715 днів тому
Game to practice learning stack creation, and overwriting variables on the stack.
Stack creation and finding variable within memoryStack creation and finding variable within memory
Stack creation and finding variable within memory
Переглядів 46620 днів тому
quick 12 minute video displaying the creation of a stack and how varibales are stored within. Important first skills to linux exploitation development
bypassing ASLR via bruteforcebypassing ASLR via bruteforce
bypassing ASLR via bruteforce
Переглядів 5028 днів тому
Video coming on the process.
Finding and overwriting variables on the stack.Finding and overwriting variables on the stack.
Finding and overwriting variables on the stack.
Переглядів 115Місяць тому
Using GDB to have fun with a small C program.
Bypassing Data execution preventionBypassing Data execution prevention
Bypassing Data execution prevention
Переглядів 1,3 тис.Місяць тому
Simple example of calling functions from libc library to bypass DEP.
Bypassing Data execution preventionBypassing Data execution prevention
Bypassing Data execution prevention
Переглядів 41Місяць тому
simple example of calling functions from libc in lieu of executing anything on the stack. More to come!
Vanilla buffer overflow basicsVanilla buffer overflow basics
Vanilla buffer overflow basics
Переглядів 834Місяць тому
with ASLR turned off. A simple demo of a buffer overflow attack. More advanced topics to come.
Using write syscall in 32 bit assemblyUsing write syscall in 32 bit assembly
Using write syscall in 32 bit assembly
Переглядів 1242 місяці тому
Brief example of using write syscall. A basic knowledge for payload creation in future videos.
Messing about with Lokibot trojanMessing about with Lokibot trojan
Messing about with Lokibot trojan
Переглядів 1005 місяців тому
2024 06 02 12 43 512024 06 02 12 43 51
2024 06 02 12 43 51
Переглядів 1245 місяців тому
Basics of API hooking VirtualAlloc and VirtualProtect to dup payloads from memory

КОМЕНТАРІ

  • @Cyberhill-security
    @Cyberhill-security 2 дні тому

    You turned off the mic on minute 2:36 but I was still a great video keep doing this is awesome. Sub and like.

  • @gauravsharma-oh7vl
    @gauravsharma-oh7vl 8 днів тому

    Want to learn more about penetration testing

  • @gauravsharma-oh7vl
    @gauravsharma-oh7vl 8 днів тому

    Nice information

  • @dgoncalo
    @dgoncalo 10 днів тому

    Amazing as usual!

    • @LeighTrinity
      @LeighTrinity 8 днів тому

      You're the best! Thanks my friend!

  • @neiltropolis
    @neiltropolis 10 днів тому

    Thank you Leigh 🍒🍒🍒

  • @dgoncalo
    @dgoncalo 15 днів тому

    Love the videos but this one has the camera cut from the commands :/ The zoom level doesn’t allow us to see the commands

  • @MalalRebooted
    @MalalRebooted 15 днів тому

    I'm really enjoying seeing these videos. Messing with the stack is so much fun once you understand it. Thanks for the video.

  • @yusufsalk1136
    @yusufsalk1136 20 днів тому

    That’s is great. Keep it up please.

  • @cityzenx
    @cityzenx 20 днів тому

    🤟😎🤟 Thanks for the explanation 🍿👍

    • @LeighTrinity
      @LeighTrinity 20 днів тому

      My pleasure. Helps me study and relearn.🙂

  • @chrismcgowan3938
    @chrismcgowan3938 20 днів тому

    I like your explanation of the stack. Well done. I am also wondering why you are running Linux in a VM rather than running native.

    • @LeighTrinity
      @LeighTrinity 20 днів тому

      Thank you my friend. I do a lot of malware research and most of my work is vm. I needed a older 32 bit system so downloading a old unbuntu worked best.🙂

    • @chrismcgowan3938
      @chrismcgowan3938 20 днів тому

      @@LeighTrinity Hey, good luck in Ukraine. Слава Україні! (Slava Ukraini) 🙂

    • @LeighTrinity
      @LeighTrinity 15 днів тому

      @@chrismcgowan3938 Thanks brother!

  • @gauravsharma-oh7vl
    @gauravsharma-oh7vl 20 днів тому

    Nice

  • @MalalRebooted
    @MalalRebooted 22 дні тому

    Randomly found your channel, and it's GREAT to see someone who also knows assembler. Keep it up, I miss actual coding/exploiting content done in a real language.

    • @LeighTrinity
      @LeighTrinity 22 дні тому

      Thank you so much! I adore assembly. More to come! Thank you so much for the comment!

  • @firosiam7786
    @firosiam7786 22 дні тому

    ❤❤❤❤❤❤

  • @franciscoribeiro495
    @franciscoribeiro495 23 дні тому

    Great video! Very instructive, the way you walked through all things to get it done. Keep it coming, please!

    • @LeighTrinity
      @LeighTrinity 22 дні тому

      Thank you so very much! I enjoy sharing this stuff and comments like this make me wanna share more.🥰

  • @rayb5204
    @rayb5204 Місяць тому

    Great tutorial Leigh...nicely explained....looking forward to the next one!

    • @LeighTrinity
      @LeighTrinity Місяць тому

      Thank you! Slowly figuring this stuff out.☺

  • @sipiratefr
    @sipiratefr Місяць тому

    Thank you for the video. Something you might find useful: there is a lot of wasted screen space in the video, which I found to be a bother. We can see the Windows task bar at the bottom, the linux one on the left, the VirtualBox options at the top, and you spent a lot of time typing in small windows. I think a solution would be to stream the fullscreen VirtualBox window directly in obs. If you want to show pictures / other stuff from Windows you can always stream that window in obs (it's easy to add another image source in obs and to put it to the front when you need to then discard it). You can also add you pictures to the virtual machine and show them in Ubuntu (send them from windows to the VM with VirtualBox's shared folder). Also, you can disable the task bar in Ubuntu and maximize your terminal windows when possible (or just make them bigger). Last thing: I think it is great to show your face to make the presentation more personal but the top left corner is where code tends to be by default. Maybe put your webcam in the top right corner instead?

    • @LeighTrinity
      @LeighTrinity Місяць тому

      very constructive! Thank you!

  • @Zamora7
    @Zamora7 Місяць тому

    Okay Great

  • @electrowizard2658
    @electrowizard2658 Місяць тому

    great stuffs mam really liked it

  • @keylanoslokj1806
    @keylanoslokj1806 Місяць тому

    Are you a pen tester

    • @LeighTrinity
      @LeighTrinity Місяць тому

      Red team 100%

    • @keylanoslokj1806
      @keylanoslokj1806 Місяць тому

      @@LeighTrinity was your background in engineering

    • @LeighTrinity
      @LeighTrinity Місяць тому

      @@keylanoslokj1806 No Reversing is something I got into last year and fell in love.☺

  • @khorea
    @khorea Місяць тому

    thank you, it was very helpful for me

  • @leghdaf
    @leghdaf Місяць тому

    interesting and valuable , thanks for the demo ...

  • @dgoncalo
    @dgoncalo Місяць тому

    As a Red Teamer getting into exploit dev, thanks for the content!

    • @LeighTrinity
      @LeighTrinity Місяць тому

      Thanks brother! Glad to help fellow red teamers.🙂

  • @kurtl9856
    @kurtl9856 Місяць тому

    Do you have a write up anywhere about this simple attack? Nice video!

    • @LeighTrinity
      @LeighTrinity Місяць тому

      thank you so very much! No I'm just starting to put together a online presence! Soon!!

  • @hc1770
    @hc1770 Місяць тому

    11:14 Is there any particular reason the return address of 0xbfffff430 was chosen instead of the next one?

    • @LeighTrinity
      @LeighTrinity Місяць тому

      No anywhere on the nops is fine!

    • @hc1770
      @hc1770 Місяць тому

      Thanks! Looking forward to your next video!

  • @beaverbuoy3011
    @beaverbuoy3011 Місяць тому

    Ooh!

  • @chrismcgowan3938
    @chrismcgowan3938 Місяць тому

    I did not know you could do that in gdb. I generally just do a stack dump ..... thanks for the lesson

  • @leghdaf
    @leghdaf Місяць тому

    Awesome demo! I'm excited to learn more from your content

    • @LeighTrinity
      @LeighTrinity Місяць тому

      Thank you! Exploit dev is sooo much fun!

  • @Jamonpeligroso
    @Jamonpeligroso Місяць тому

    Good stuff! Looking forward to the future content. Would have loved a bit more in depth breakdown of that payload, to understand where we're jumping to in order to invoke that shell

    • @LeighTrinity
      @LeighTrinity Місяць тому

      Thank you so much! I will 100% do a video on making your own 32 t payload very soon!! Sounds like I need a few graphics. Thank you so much for the feedback!

  • @jhonmccloud
    @jhonmccloud Місяць тому

    Great content. Will love to see some exploit development stuff. Cheers.

    • @LeighTrinity
      @LeighTrinity Місяць тому

      Thank you! More low level stuff and exploit dev to come.☺

  • @rayb5204
    @rayb5204 Місяць тому

    Another excellent video, Leigh!

    • @LeighTrinity
      @LeighTrinity Місяць тому

      Thank you! Had fun making it.🥰

  • @rayb5204
    @rayb5204 2 місяці тому

    Nicely done and explained!

  • @rayb5204
    @rayb5204 2 місяці тому

    Outstanding! Great explanation

    • @LeighTrinity
      @LeighTrinity 2 місяці тому

      Thank you!! I've been doing a deep dive into this stuff. I think I have the basics.☺