video thumbnail 11:21
First Stack Buffer Overflow to modify Variable - bin 0x0C

2016-01-29

[public] 136K views, 2.92K likes, 16.0 dislikes audio only

channel thumbLiveOverflow

We will write our first Buffer Overflow for the stack0 level of exploit-exercises.com.

stack0: https://exploit.education/protostar/stack-zero/

Intel Reference: intel.de/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf

-=[ ā¤ļø Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ• Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Website: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ šŸ“„ P.S. ]=-

All links with "*" are affiliate links.

LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#BinaryExploitation #BufferOverflow


Intro
/youtube/video/T03idxny9jE?t=0
Questions
/youtube/video/T03idxny9jE?t=12
Challenge Description
/youtube/video/T03idxny9jE?t=33
Debugging
/youtube/video/T03idxny9jE?t=169
Assembly
/youtube/video/T03idxny9jE?t=460
LiveOverflow just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ā¤ļø Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ šŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany
/youtube/channel/UClcE-kVhqyiHCcjYwcpfj9w
I’m moving, no videos sorry 17,544 views
/youtube/video/9CS3q0uG1LI