video thumbnail 24:58
Format String Exploit Troubleshooting Over Twitter - bin 0x11 b

2021-02-25

[public] 48.4K views, 4.56K likes, 33.0 dislikes audio only

channel thumbLiveOverflow

Helping somebody with a simple format string exploit via twitter. Getting stuck with problems is one of the most frustrating but best ways to learn. That's why I like to help people figure out their own issues, rather than just telling them.

https://exploit.education/protostar/

Binary Exploitation Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN

Voice Actor John Hammond: https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw

00:00 Intro

00:59 Question via Twitter DM

02:16 My Initial Thoughts and Analysis

03:20 Format String Recap

04:30 Analyzing The Broken Script

05:39 "Where is the flag?" What is the challenge goal?

06:20 Question 1: What does %s do?

07:16 Question 2: What is the difference between %x and %s?

08:07 GO WATCH MY OLD VIDEOS!

08:28 Question 3: Does %s print strings from the stack?

09:09 Binary Exploitation Episode 0x1E & Google Solutions

10:45 Question 4 Going Back to Basics!

12:05 Question 5: How to print actual stack values?

13:05 Miscommunication via Text Messages

13:45 Wrong Challenge Assumptions

14:33 Miscommunication Again

15:35 Testing %x

15:56 Recognizing ASCII in hexdump

17:10 Typical Format String Exploit Issues

17:59 Running Into More Weird Bugs

20:23 Debugging The Script

21:45 Almost Solved It!

22:45 Found the Flag!

23:20 Ooops! They Had Solved It Earlier

23:34 Conclusion: Helping People Takes Time

24:15 Is This a Good Video?

24:39 Outro

-=[ ā¤ļø Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ• Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Instagram: https://instagram.com/LiveOverflow/

→ Website: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/


How (not) to ask a technical question by LiveOverflow
/youtube/video/53zkBvL4ZB4
WHY YOUR HACKING QUESTIONS ARE FRUSTRATING!!! by LiveOverflow
/youtube/video/3IEAfyQqUKc
Remote format string exploit in syslog() - bin 0x1E by LiveOverflow
/youtube/video/MBz5C9Wa6KM
ey! Look for patterns by LiveOverflow
/youtube/video/Jpaq0QkepgA
Intro
/youtube/video/F6UerHkVdLA?t=0
Question via Twitter DM
/youtube/video/F6UerHkVdLA?t=59
My Initial Thoughts and Analysis
/youtube/video/F6UerHkVdLA?t=136
Format String Recap
/youtube/video/F6UerHkVdLA?t=200
Analyzing The Broken Script
/youtube/video/F6UerHkVdLA?t=270
"Where is the flag?" What is the challenge goal?
/youtube/video/F6UerHkVdLA?t=339
Question 1: What does %s do?
/youtube/video/F6UerHkVdLA?t=380
Question 2: What is the difference between %x and %s?
/youtube/video/F6UerHkVdLA?t=436
GO WATCH MY OLD VIDEOS!
/youtube/video/F6UerHkVdLA?t=487
Question 3: Does %s print strings from the stack?
/youtube/video/F6UerHkVdLA?t=508
Binary Exploitation Episode 0x1E & Google Solutions
/youtube/video/F6UerHkVdLA?t=549
Question 4 Going Back to Basics!
/youtube/video/F6UerHkVdLA?t=645
Question 5: How to print actual stack values?
/youtube/video/F6UerHkVdLA?t=725
Miscommunication via Text Messages
/youtube/video/F6UerHkVdLA?t=785
Wrong Challenge Assumptions
/youtube/video/F6UerHkVdLA?t=825
Miscommunication Again
/youtube/video/F6UerHkVdLA?t=873
Testing %x
/youtube/video/F6UerHkVdLA?t=935
Recognizing ASCII in hexdump
/youtube/video/F6UerHkVdLA?t=956
Typical Format String Exploit Issues
/youtube/video/F6UerHkVdLA?t=1030
Running Into More Weird Bugs
/youtube/video/F6UerHkVdLA?t=1079
Debugging The Script
/youtube/video/F6UerHkVdLA?t=1223
Almost Solved It!
/youtube/video/F6UerHkVdLA?t=1305
Found the Flag!
/youtube/video/F6UerHkVdLA?t=1365
Ooops! They Had Solved It Earlier
/youtube/video/F6UerHkVdLA?t=1400
Conclusion: Helping People Takes Time
/youtube/video/F6UerHkVdLA?t=1414
Is This a Good Video?
/youtube/video/F6UerHkVdLA?t=1455
Outro
/youtube/video/F6UerHkVdLA?t=1479
LiveOverflow just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ā¤ļø Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ šŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany
/youtube/channel/UClcE-kVhqyiHCcjYwcpfj9w
I’m moving, no videos sorry 17,490 views
/youtube/video/9CS3q0uG1LI
Patreon patreon.com
https://www.patreon.com/join/liveoverflow
Binary Exploitation / Memory Corruption by LiveOverflow by LiveOverflow
/youtube/video/iyAyN3GFM7A