video thumbnail 12:17
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21

2017-07-07

[public] 77.8K views, 2.01K likes, 10.0 dislikes audio only

We have a look at stack level 0 from exploit-exercises.com/Protostar and compile it on a current Ubuntu, to see if it's still exploitable.

stack0: https://liveoverflow.com/binary_hacking/protostar/stack0.html

digitalocean referral:* https://m.do.co/c/826f195e2288

-=[ ā¤ļø Support ]=-

ā†’ per Video: https://www.patreon.com/join/liveoverflow

ā†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ• Social ]=-

ā†’ Twitter: https://twitter.com/LiveOverflow/

ā†’ Website: https://liveoverflow.com/

ā†’ Subreddit: https://www.reddit.com/r/LiveOverflow/

ā†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ šŸ“„ P.S. ]=-

All links with "*" are affiliate links.

LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#BinaryExploitation #BufferOverflow


First Stack Buffer Overflow to modify Variable - bin 0x0C by LiveOverflow
/youtube/video/T03idxny9jE
Compile a 32 Bit Program on 64 Bit
/youtube/video/4HxUmbOcN6Y?t=630.67999
LiveOverflow just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ā¤ļø Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ šŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany
/youtube/channel/UClcE-kVhqyiHCcjYwcpfj9w
Iā€™m moving, no videos sorry 17,457 views
/youtube/video/9CS3q0uG1LI
Binary Exploitation / Memory Corruption by LiveOverflow by LiveOverflow
/youtube/video/iyAyN3GFM7A