Linux Binary Exploitation

Поділитися
Вставка
  • Опубліковано 10 лис 2024

КОМЕНТАРІ • 13

  • @P4ExHzLRuuiFMg3X4U3v
    @P4ExHzLRuuiFMg3X4U3v Місяць тому +1

    Ciao Leonardo, I've been following your videos for the last couple of months. They're super informative and I'm having a great time learning about this stuff. Thank you for making these!

  • @pradeepkumarsharma8789
    @pradeepkumarsharma8789 Місяць тому +1

    Waiting for cloudflare decode

  • @kamilnowak9110
    @kamilnowak9110 Місяць тому

    What code theme do you use?

    • @hexdump1337
      @hexdump1337  Місяць тому

      Spacemacs dark theme in Emacs

  • @seba675
    @seba675 Місяць тому +1

    beautifull...ive tried it too but i used pwndbg and the execve work at least for 1 command and then it crash but only in the debugger...does the debugger modify something on the execution of the program? because in dmesg i get a different return address

    • @seba675
      @seba675 Місяць тому

      i think i found it...i didnt disable the ASLR

    • @hexdump1337
      @hexdump1337  Місяць тому

      after that does it work? notice that in the exploit I hard coded the initial stack address too as well as the offset. They could change too depending on the environment (maybe not the offset itself)

    • @seba675
      @seba675 Місяць тому

      @@hexdump1337 yeah i found them, i tried to compile the c program with the -no-pie flag to remove the address randomization but the behavior doesnt change (i can execute the payload only in gdb)

    • @seba675
      @seba675 Місяць тому

      Yep i found them and compiled with no ASLR but nothing changed (the payload work only in gdb)

  • @BraylonBarnes-t1t
    @BraylonBarnes-t1t Місяць тому

    do you have a discord

    • @hexdump1337
      @hexdump1337  Місяць тому

      not as of right now, I’m thinking if I can use other platforms for the future

    • @pradeepkumarsharma8789
      @pradeepkumarsharma8789 Місяць тому

      @@hexdump1337 it will be great to connect with you