2019-03-17
[public] 47.7K views, 2.48K likes, 28.0 dislikes audio only
Let's introduce the concept of a weird machine in order to understand ROP differently. It's maybe a bad tutorial.
What Hacker Research Taught Me: https://www.youtube.com/watch?v=Dd9UtHalRDs
Science of Insecurity: https://www.youtube.com/watch?v=3kEfedtQVOY
A Patch for Postelโs
Robustness Principle: http://langsec.org/papers/postel-patch.pdf
Exploit Programming
From Buffer Overflows to โWeird Machinesโ and
Theory of Computation: http://langsec.org/papers/Bratus.pdf
-=[ ๐ด Stuff I use ]=-
โ Microphone:* https://geni.us/ntg3b
โ Graphics tablet:* https://geni.us/wacom-intuos
โ Camera#1 for streaming:* https://geni.us/sony-camera
โ Lens for streaming:* https://geni.us/sony-lense
โ Connect Camera#1 to PC:* https://geni.us/cam-link
โ Keyboard:* https://geni.us/mech-keyboard
โ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ โค๏ธ Support ]=-
โ per Video: https://www.patreon.com/join/liveoverflow
โ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ ๐ Social ]=-
โ Twitter: https://twitter.com/LiveOverflow/
โ Website: https://liveoverflow.com/
โ Subreddit: https://www.reddit.com/r/LiveOverflow/
โ Facebook: https://www.facebook.com/LiveOverflow/
-=[ ๐ P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#BinaryExploitation