Тёмный

Heap BINARY EXPLOITATION w/ Matt E! 

John Hammond
Подписаться 1,9 млн
Просмотров 23 тыс.
50% 1

Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeac...
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
📗Humble Bundle ➡ j-h.io/humbleb...
🐶Snyk ➡ j-h.io/snyk
🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ j-h.io/sponsor...
🚩 CTF Hosting Requests ➡ j-h.io/ctf
🎤 Speaking Requests ➡ j-h.io/speaking
💥 Malware Submission ➡ j-h.io/malware
❓ Everything Else ➡ j-h.io/etc

Опубликовано:

 

4 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 28   
@CBro-d5d
@CBro-d5d Год назад
Heres an analogy that helped me wrap my head around the concept of tcache.. So a construction worker rents a bunch of tools from a tool rental company. These tools come from the warehouse, which is down the street from the storefront. When the construction worker finishes with the tools, he brings them back to the store. Realizing that the tools are popular, the store worker puts the tools on a shelf in the store, instead of sending them back to the warehouse. That way they are easier to get for the next customer. The tools represent the blocks of memory, the tool rental company's warehouse represents the main memory, and the storefront represents the Tcache. When the tools (memory blocks) are returned (freed), instead of being sent back to the warehouse (main memory), they are kept at the storefront (Tcache) for faster access in future. So just like how it's more convenient and faster for the next construction worker (program or thread) to get the tools (memory blocks) from the storefront (Tcache) than from the warehouse (main memory), it's also more efficient for a program or thread to get memory blocks from the Tcache than from the main memory.
@Sam-wl7vn
@Sam-wl7vn 2 года назад
When you stop Matt to ask for Ghidra keybindings and explanations, that is super useful. Definitely doing the right thing there 🙂
@janosmarton7895
@janosmarton7895 2 года назад
More binary exploitation pls. Can you link Matt’s RU-vid pls 🙏🏻
@DamianRyse
@DamianRyse 2 года назад
3 days ago, I tried to solve that exact challenge on Pico and I also never heared of tcache before. When didn't get any further on the binary and didn't know how to proceed, I thought "pretty sure John Hammond did that already, let's see if he has a video online about that". But I didn't find one and searched for other write-ups to help me solving and understanding tcache. And now you uploaded the vid that I would have needed a few days ago. :-D
@jackcruz4936
@jackcruz4936 2 года назад
15:20 Matt says: "it's very basic program" me: 🤯🤯
@ani-zxk
@ani-zxk 8 месяцев назад
I can't stop coming back to this video, matt is so skilled and knowledgeable.
@pomberorajy
@pomberorajy 2 года назад
I have been learning all the details of this challenge for the last 5 days, what a coincidence seeing this here!
@WhatTheWeb
@WhatTheWeb 2 года назад
I would love to see a demo of kit engine. Even for more experienced pwners browser stuff is quite daunting. Even going forward it would be nice if he could showcase more advanced techniques like kernel exploitation, browser, race conditions, etc. Great video!
@tvathome562
@tvathome562 2 года назад
Wow I just worked through the binary exploitation deep dive matt, yesterday.. Looking forward to learning more....
@Bashir_Khan
@Bashir_Khan 7 месяцев назад
Thanks a lot dude! You really helped me out there
@oussamaqazdar4787
@oussamaqazdar4787 2 года назад
More of this please ❤️
@cleightthejw2202
@cleightthejw2202 2 года назад
Hey the guy is talking about some deep stuff :) This is a whole different level of knowledge (which is worth learning which is worth the time to learn) :)
@kryptux2463
@kryptux2463 2 года назад
Love your work John. Keep it up.
@applePrincess
@applePrincess 2 года назад
About patchelf, it overwrites a "cleaned" version by changing meta information stored in elf binary, so better keep original one just in case that broken??? path was the trick. And about Matt saying didn't run by applying patchelf, I bet env var messed up (I obviously didn't see the situation so don't quote me on this one 😆) again great video thank to both of you.
@chainsawmanfan3002
@chainsawmanfan3002 Год назад
This is a 'Basic' challenge.
@ernestoo8313
@ernestoo8313 2 года назад
Amazing content! Thanks very much!
@emdwyer7331
@emdwyer7331 2 года назад
Aaand I'm lost very quickly. Lol. Need to backtrack my learning and start from the beginning
@Bashir_Khan
@Bashir_Khan 8 месяцев назад
Can you please provide the link to the video you're referring to when you said at 17:55 about how you set up the pawninit command.
@claymoody
@claymoody 2 года назад
Go Tigers!!
@KFLawless1412
@KFLawless1412 Год назад
Can we crowdfund a new microphone for Matt?
@chainsawmanfan3002
@chainsawmanfan3002 Год назад
I'm really new to this field, may I know what pwninit does????
@laurenlewis4189
@laurenlewis4189 2 года назад
I searched M. Alpha and got a friggin Sigma grindset "life coach". Does Matt have any social media?
@ahmedahmedx9600
@ahmedahmedx9600 2 года назад
You are not bug hunter and you have hackerone t-shirt 😂
@guilherme5094
@guilherme5094 2 года назад
👍
@anwarulbashirshuaib5673
@anwarulbashirshuaib5673 Год назад
can anyone help me with the part at 10:12? I did not understand why he changed it to char[3]
@anwarulbashirshuaib5673
@anwarulbashirshuaib5673 Год назад
nevermind, he explained it later
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
Linux what
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
Zoom
Далее
Return Oriented Programming (PicoCTF 2022 #48 'ropfu')
35:09
КОГДА НАКРОШИЛ НА ПОЛ #shorts
00:19
Joining a HOME LAB Domain (Active Directory #01)
51:39
Where People Go When They Want to Hack You
34:40
Просмотров 1,9 млн
Binary Exploitation Deep Dive: Return to LIBC (with Matt)
2:12:41
Basic Buffer Overflow - VulnServer TRUN
1:03:04
Просмотров 196 тыс.
How Hackers Hide
20:55
Просмотров 239 тыс.
Google CTF - BEGINNER Reverse Engineering w/ ANGR
39:47
Python Pwntools Hacking: ret2libc GOT & PLT
44:49
Просмотров 48 тыс.