Ciao Leonardo, I've been following your videos for the last couple of months. They're super informative and I'm having a great time learning about this stuff. Thank you for making these!
beautifull...ive tried it too but i used pwndbg and the execve work at least for 1 command and then it crash but only in the debugger...does the debugger modify something on the execution of the program? because in dmesg i get a different return address
after that does it work? notice that in the exploit I hard coded the initial stack address too as well as the offset. They could change too depending on the environment (maybe not the offset itself)
@@hexdump1337 yeah i found them, i tried to compile the c program with the -no-pie flag to remove the address randomization but the behavior doesnt change (i can execute the payload only in gdb)
Ciao Leonardo, I've been following your videos for the last couple of months. They're super informative and I'm having a great time learning about this stuff. Thank you for making these!
Thanks, appreciated!
Waiting for cloudflare decode
What code theme do you use?
Spacemacs dark theme in Emacs
beautifull...ive tried it too but i used pwndbg and the execve work at least for 1 command and then it crash but only in the debugger...does the debugger modify something on the execution of the program? because in dmesg i get a different return address
i think i found it...i didnt disable the ASLR
after that does it work? notice that in the exploit I hard coded the initial stack address too as well as the offset. They could change too depending on the environment (maybe not the offset itself)
@@hexdump1337 yeah i found them, i tried to compile the c program with the -no-pie flag to remove the address randomization but the behavior doesnt change (i can execute the payload only in gdb)
Yep i found them and compiled with no ASLR but nothing changed (the payload work only in gdb)
do you have a discord
not as of right now, I’m thinking if I can use other platforms for the future
@@hexdump1337 it will be great to connect with you