Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=XuzuFUGuQv0



Duration: 13:25
46,094 views
1,354


Solving Eat Sleep Pwn Repeat (ESPR - 150 pwn) challenge from the 33c3ctf. Dumping the binary through a format string vulnerability, leaking libc addresses in the global offset table, finding the matching libc and overwriting printf@got with system() to get RCE.

-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* https://geni.us/ntg3b
β†’ Graphics tablet:* https://geni.us/wacom-intuos
β†’ Camera#1 for streaming:* https://geni.us/sony-camera
β†’ Lens for streaming:* https://geni.us/sony-lense
β†’ Connect Camera#1 to PC:* https://geni.us/cam-link
β†’ Keyboard:* https://geni.us/mech-keyboard
β†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#CTF #FormatString #BinaryExploitation







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
format string
formatstring
format exploit
format vulnerability
format string exploit
leak libc
leak address
dump arbitrary memory
find libc
libc database
niklasb
eat sleep pwn repeat
33c3
33c3ctf
ESPR
pwnable challenge
exploitation challenge
remote code execution
dump remote binary
video writeup
ctf write-up
capture-the-flag
security ctf
33c3 ctf