Тёмный

Custom Binary Exploit - Overgraph [HackTheBox] 

0xdf
Подписаться 11 тыс.
Просмотров 1,3 тыс.
50% 1

Опубликовано:

 

30 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 9   
@_hackwell
@_hackwell 2 года назад
Thanks for the video. Can't believe I didn't even think about abusing the name! Instead I found a pointer to a writable area at 0x3fe410 and played with negative message numbers etc... overthought this again :-D Really enjoyed this box btw
@techworld323
@techworld323 2 года назад
Thanks for the precious content. I spent my hours of reading your write-ups thanks you are really great 🔥
@fabiorj2008
@fabiorj2008 2 года назад
Nice video man. Can you explain why number 12 ro put in edit ?
@0xdf
@0xdf 2 года назад
message_array[12] lines up with the start of userinfo1. Is that what you mean? Check out the diagram at 17:10.
@juhofinnish420
@juhofinnish420 2 года назад
you are fantastic.please keep sharing your knowledge with us.
@RajKumar-vx3rn
@RajKumar-vx3rn Год назад
Bro (In your writeup for Overgraph), How did you perform the csrf attack with XMLHttpRequest as it is cross-domain and there is no CORS misconfiguration present
@0xdf
@0xdf Год назад
off the top of my head, i believe there was an approval between the domain and the subdomain
@outkast9882
@outkast9882 2 года назад
What are you using for the gdb layout? I use gdb-dashboard but I like how it shows the pointer to the actual value (“test”)
@0xdf
@0xdf 2 года назад
peda. github.com/longld/peda
Далее
ДЕНЬ УЧИТЕЛЯ В ШКОЛЕ
01:00
Просмотров 1,9 млн
Sony 521 on Ebay
3:14
Просмотров 1
Python Flask Jinja2 SSTI Payload Analysis
12:28
Dev Deletes Entire Production Database, Chaos Ensues
10:20
I used to hate QR codes. But they're actually genius
35:13
Hash Extension Attack [HackTheBox Ouija]
26:12
When you Accidentally Compromise every CPU on Earth
15:59
Playing with Jenkins File Read [CVE-2024-23897]
20:44
Просмотров 3,3 тыс.