Global variable Buffer Overflow to leak memory - 34C3 CTF readme_revenge (pwn)

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=lE6ke7pqCNY



Duration: 16:13
84,696 views
2,513


Two years ago I failed to solve the readme challenge at the 32c3ctf. Since then I have learned a lot and I got another chance!

readme 32c3ctf: https://www.youtube.com/watch?v=wLsckMfScOg
readme_revenge: https://archive.aachen.ccc.de/34c3ctf.ccc.ac/challenges/index.html
What is CTF? https://www.youtube.com/watch?v=8ev9ZX9J45A
Why you should play CTFs: https://www.youtube.com/watch?v=rfjV8XukxO8

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#CTF #BinaryExploitation







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
readme
32c3
34c3
32c3ctf
34c3ctf
readme_revenge
readme revenge
leak memory
memory leak
argv
printf
customize printf
format string
%s
function table
__printf_function_table
tuwat
pwn
pwnable
ctf
ctftime
c3 ctf
c3
gdb
pwndbg
dynamic loaded
ldd
debugging
exploit
python script
linux
exploit development
capture the flag
capture-the-flag