Shellcode Execution (ret2shellcode) - pwn104 - PWN101 | TryHackMe

Поділитися
Вставка
  • Опубліковано 22 лис 2024

КОМЕНТАРІ • 22

  •  2 роки тому +5

    This is one of the best videos I've seen on the ret2shellcode attack. I learned a lot, thank you!

  • @ahmadashraf1542
    @ahmadashraf1542 2 роки тому +1

    Amazing !
    Waiting for more.

  • @marcovalentinoalvarado3290
    @marcovalentinoalvarado3290 2 роки тому +1

    I learned SO MUCH on this one! This was a blast! Thank you Thank you Thank you Thank you Thank you 🙏🙏🙏🙏🙏

  • @danielcmihai
    @danielcmihai 2 роки тому +2

    Nice job yet again!! ( Love the eerie music at 16:34 )
    PS: I've used p.recvuntil("I'm waiting for you at ") and then p.recv().

    • @RazviOverflow
      @RazviOverflow  2 роки тому +1

      Thank you once again! 💪
      I usually don't use recvuntil since I prefer to retrieve all the input and then parse it myself in python, rather than making pwntools parse it and stop at a given byte sequence. It is irrelevant, nevertheless.
      P.S: The song is the same as the one used in the outro. The track is specified in the description :)

  • @00habib00
    @00habib00 2 роки тому +2

    very very informative! thanks a lot man!

    • @RazviOverflow
      @RazviOverflow  2 роки тому

      You are welcome! Stay tuned for more videos :)

  • @uremomisepic
    @uremomisepic 2 роки тому +2

    why does the shellcode come before the padding in this case? In the previous videos you did the padding first.

    • @RazviOverflow
      @RazviOverflow  2 роки тому +3

      Because that's the beginning of the address where our input is stored into memory, and where we are redirecting the execution flow because the program is leaking that very address. In other words, by overwriting the return address of the vulnerable function, we make the RIP (instruction pointer) jump and start executing the contents at that address, that's why you have to place the shellcode at the beginning. If you would otherwise place the padding first, say AAAA... (0x41414141...), the program would try to interpret that data as opcode (actual instructions) and they are invalid. It is explained around 12:25

  • @SlovakiaPanda
    @SlovakiaPanda 2 роки тому

    this is wonderful

  • @GokEnsar
    @GokEnsar Рік тому

    in my connections, when i delete with backspace, it deletes all word (not one char, deletes until a space) how can i fix it? thanks.

    • @RazviOverflow
      @RazviOverflow  Рік тому

      What exactly do you mean?

    • @GokEnsar
      @GokEnsar Рік тому

      @@RazviOverflow when i type sth in the Shell, and press backspace, it deletes all the word not one character

  • @davidmohan2698
    @davidmohan2698 6 місяців тому

    Why do you minus shellcode? why do you not add them all together like in the previous videos?

    • @RazviOverflow
      @RazviOverflow  6 місяців тому

      I'm not doing -shellcode, I'm doing - len(shellcode). That's because I want to pad with A's 0x50 minus the bytes of the shellcode, and I don't want to manually count them. So I use 0x50 - len(shellcode)

    • @davidmohan2698
      @davidmohan2698 6 місяців тому

      @@RazviOverflow Oh ok what is the purpose of subtracting 0x50 from the length of the shellcode ?

    • @davidmohan2698
      @davidmohan2698 6 місяців тому

      ignore me I think I figured it out.

    • @RazviOverflow
      @RazviOverflow  5 місяців тому +1

      @@davidmohan2698 No worries at all. If you still have any doubt ask me, I'll do my best to clarify it.