Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=SstD1O4_kwc



Duration: 9:27
25,130 views
741


We overflow a buffer and slowly figure out that we can control memory addresses to leak other data.

The challenge files: https://github.com/Riscure/Rhme-2016


-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* https://geni.us/ntg3b
β†’ Graphics tablet:* https://geni.us/wacom-intuos
β†’ Camera#1 for streaming:* https://geni.us/sony-camera
β†’ Lens for streaming:* https://geni.us/sony-lense
β†’ Connect Camera#1 to PC:* https://geni.us/cam-link
β†’ Keyboard:* https://geni.us/mech-keyboard
β†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#BufferOverflow #CTF




Other Videos By LiveOverflow


2017-07-07Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21
2017-06-30Blind GQL injection and optimised binary search - A7 ~ Gee cue elle (misc) Google CTF 2017
2017-06-23Failing easy local file inclusion challenge - mindreader (misc) Google CTF 2017
2017-06-16Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
2017-06-09Defeat 2FA token because of bad randomness - rhme2 Twistword (Misc 400)
2017-06-06[Podcast] Fuzzing FFmpeg - Paul Cher
2017-06-02Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100)
2017-05-26RSA Power Analysis Side-Channel Attack - rhme2
2017-05-19Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
2017-05-12Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
2017-05-05Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
2017-05-02How (not) to ask a technical question
2017-04-28Format string exploit on an arduino - rhme2 Casino (pwn 150)
2017-04-21Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
2017-04-14Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
2017-04-07Attacking an Electronic Combination Lock (ft. Electronics Idiot)
2017-03-31A day in the life of a pen-tester
2017-03-24Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
2017-03-17Start reverse engineering AVR - Memory Map and I/O Registers - rhme2 Reverse Engineering
2017-03-12What do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-through
2017-03-10SHA1 length extension attack on the Secure Filesystem - rhme2 Secure Filesystem (crypto 100)



Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
buffer overflow
control address
overflow buffer
avr buffer overflow
arduino buffer overflow
rhme2
step by step
exploit buffer overflow
bof tutorial
exploitation theory
mind map
what hacker think
think like hacker
white board exploit
exploit planning
hacking plan