video thumbnail 25:48
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2

2016-03-09

[public] 11.9K views, 162 likes, dislikes audio only

Part 1: reverse engineering the functionality of the cookbook binary with IDA

Part 2: Leaking heap address and libc base address

Part 3: Arbitrary write - House of Force

exploit: https://gist.github.com/LiveOverflow/dadc75ec76a4638ab9ea

-=[ 🔴 Stuff I use ]=-

→ Microphone:* https://geni.us/ntg3b

→ Graphics tablet:* https://geni.us/wacom-intuos

→ Camera#1 for streaming:* https://geni.us/sony-camera

→ Lens for streaming:* https://geni.us/sony-lense

→ Connect Camera#1 to PC:* https://geni.us/cam-link

→ Keyboard:* https://geni.us/mech-keyboard

→ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Website: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.

LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#CTF #BinaryExploitation #HeapOverflow


Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1 by LiveOverflow
/youtube/video/f1wp6wza8ZI
Leak the Global Offset Table Entry for Printf
/youtube/video/dnHuZLySS6g?t=836.40997
Simulate an Overwrite with Chosen Address
/youtube/video/dnHuZLySS6g?t=1385.3199