Vanilla buffer overflow basics

Поділитися
Вставка
  • Опубліковано 19 вер 2024
  • with ASLR turned off. A simple demo of a buffer overflow attack. More advanced topics to come.

КОМЕНТАРІ • 17

  • @rayb5204
    @rayb5204 4 дні тому +1

    Another excellent video, Leigh!

  • @bloatless
    @bloatless 2 дні тому +1

    Awesome demo! I'm excited to learn more from your content

    • @LeighTrinity
      @LeighTrinity  День тому +1

      Thank you! Exploit dev is sooo much fun!

  • @Jamonpeligroso
    @Jamonpeligroso 3 дні тому +1

    Good stuff! Looking forward to the future content. Would have loved a bit more in depth breakdown of that payload, to understand where we're jumping to in order to invoke that shell

    • @LeighTrinity
      @LeighTrinity  День тому +1

      Thank you so much! I will 100% do a video on making your own 32 t payload very soon!! Sounds like I need a few graphics. Thank you so much for the feedback!

  • @chrismcgowan3938
    @chrismcgowan3938 2 дні тому +2

    I did not know you could do that in gdb. I generally just do a stack dump ..... thanks for the lesson

  • @jhonmccloud
    @jhonmccloud 4 дні тому +1

    Great content. Will love to see some exploit development stuff. Cheers.

    • @LeighTrinity
      @LeighTrinity  3 дні тому +2

      Thank you! More low level stuff and exploit dev to come.☺

  • @beaverbuoy3011
    @beaverbuoy3011 День тому +1

    Ooh!

  • @kurtl9856
    @kurtl9856 День тому +1

    Do you have a write up anywhere about this simple attack? Nice video!

    • @LeighTrinity
      @LeighTrinity  19 годин тому

      thank you so very much! No I'm just starting to put together a online presence! Soon!!

  • @hc1770
    @hc1770 День тому +1

    11:14 Is there any particular reason the return address of 0xbfffff430 was chosen instead of the next one?

    • @LeighTrinity
      @LeighTrinity  День тому +1

      No anywhere on the nops is fine!

    • @hc1770
      @hc1770 День тому

      Thanks! Looking forward to your next video!