Global Offset Table (GOT) and Procedure Linkage Table (PLT) - bin 0x12

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=kUk5pw4w0h4



Duration: 6:58
78,433 views
1,389


In this video we will introduce how shared libraries like libc are used by C programs. Specifically we will look at the Global Offset Table and the Procedure Linkage Table.

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.




Other Videos By LiveOverflow


2016-09-13XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
2016-09-09Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
2016-09-06Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
2016-09-02Introducing the AngularJS Javascript Framework - XSS with AngularJS 0x00
2016-08-30What is PHP and why is XSS so common there? - web 0x02
2016-08-26Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
2016-08-23The HTTP Protocol: GET /test.html - web 0x01
2016-08-19HTML + CSS + JavaScript introduction - web 0x00
2016-08-16Format String Exploit and overwrite the Global Offset Table - bin 0x13
2016-08-12NEW VIDEOS ARE COMING - loopback 0x00
2016-04-19Global Offset Table (GOT) and Procedure Linkage Table (PLT) - bin 0x12
2016-04-09A simple Format String exploit example - bin 0x11
2016-03-28Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
2016-03-16Live Hacking - Internetwache CTF 2016 - web50, web60, web80
2016-03-10Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
2016-03-09Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
2016-03-07Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
2016-02-24pwnable.kr - Levels: fd, collision, bof, flag
2016-02-16Reverse engineering C programs (64bit vs 32bit) - bin 0x10
2016-02-10Doing ret2libc with a Buffer Overflow because of restricted return pointer - bin 0x0F
2016-02-03Buffer Overflows can Redirect Program Execution - bin 0x0D



Tags:
live hacking
live ctf
buffer overflow
hacking
let's hack
exploitation
exploit
xss
shellcode
hacker
tutorial
ctf
plt
got
procedure linkage table
global offset table
section
segment
shared library
libc
dynamic library
loader
linux
ELF
binary
reverse engineering