V
主页
0x06: Return to Lib-C (ret2system/one_gadget)
发布人
https://youtu.be/0CFWHjc4B-I?si=Lo-XAESbaH1mpxqU 6th video from the "Practical Buffer Overflow Exploitation" course covering the basics of Binary Exploitation. NX/DEP is enabled this time so we can't inject shellcode and expect it to execute. Instead, we'll use ROP to return to Lib-C, specifically libc.system('/bin/sh'). We'll use checksec, ghidra, pwndbg and create a couple of pwntools scripts (x86/x64). Finally, we'll look at the one_gadget tool, which can be used to gain a shell from libc with a single offset, providing constraints can be met! Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 Find the binary files, source code and scripts to go with the series @https://github.com/Crypto-Cat/CTF/tree/main/pwn/binary_exploitation_101 ↢Binary Exploitation / Reverse Engineering↣ Pwn.College: https://pwn.college How2Heap: https://github.com/shellphish/how2heap NightMare: https://guyinatuxedo.github.io Ir0nstone: https://ir0nstone.gitbook.io/notes/types/stack PinkDraconian: https://youtube.com/playlist?list=PLeSXUd883dhjmKkVXSRgI1nJEZUDzgLf_ More: https://github.com/Crypto-Cat/CTF#readme ↢Resources↣ Ghidra: https://ghidra-sre.org/CheatSheet.html PwnTools: https://github.com/Gallopsled/pwntools-tutorial CyberChef: https://gchq.github.io/CyberChef HackTricks: https://book.hacktricks.xyz/exploiting/linux-exploiting-basic-esp GTFOBins: https://gtfobins.github.io Decompile Code: https://www.decompiler.com Run Code: https://tio.run
打开封面
下载高清视频
观看高清视频
视频下载器
0x03: Return to Win (Ret2Win)
0x08: Leak PIE (bypass) and Lib-C (ret2system)
0x01: Overwriting Variables on the Stack (pt 1)
0x09: Overwriting Global Offset Table (GOT) Entries with printf()
0x02: Overwriting Variables on the Stack (pt 2)
0x0A: Bypassing Stack Canaries (leak + write)
0x07: Format String Vulnerabilities (printf)
0x04: Ret2Win with Function Parameters (x86/x64)
0x05: Injecting Shellcode (Shellcraft/MSFVenom)
0x03: GDB
0x00: Intro/Basics/Setup
0x00: Assembly
0x04: Pwntools
0x01: Reversing Assembly
0x02: Ghidra
0x05: Reversing Homework
【ASMR Coding】pacman game
【Audacity】如何在 Audacity 中制作电台音效
raylib projects showcase 2024
DOOM3 源码 Review
【生肉】DOOM3源码之美
Security Engineering Lecture 15: Governance and Regulation
Security Engineering Lecture 2: Threat Models and Security Policies
Security Engineering Lecture 14: Assurance and Sustainability
Security Engineering Lecture 4: Banking Security 2
Security Engineering Lecture 3: Banking Security 1
Security Engineering Lecture 6: Psychology and Behavioural Economics
【Audacity】如何实现VHS音效
Security Engineering Lecture 9: Hardware Security 2
Security Engineering Lecture 5: The Economics of Security
Way Down We Go - Kaleo (Best Part + + Reverb + Bass Boosted)
Security Engineering Lecture 13: Safety and Security
Security Engineering Lecture 16: Protecting a country for fun and profit
Security Engineering Lecture 11: Operating Systems 2
Door Kickers 2 - 自定义地图教程
【Audacity】如何实现扬声器音效
【中字CC】$70 Handheld Computer? | PocketCHIP Review
Security Engineering Lecture 10: Operating Systems 1
【生肉】How I learned electronics
牛牛牛