Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1 VIDEO
Part 1: reverse engineering the functionality of the cookbook binary with IDA
Part 2: Leaking heap address and libc base address
Part 3: Arbitrary write - House of Force
exploit: https://gist.github.com/LiveOverflow/dadc75ec76a4638ab9ea
-=[ ๐ด Stuff I use ]=-
โ Microphone:* https://geni.us/ntg3b
โ Graphics tablet:* https://geni.us/wacom-intuos
โ Camera#1 for streaming:* https://geni.us/sony-camera
โ Lens for streaming:* https://geni.us/sony-lense
โ Connect Camera#1 to PC:* https://geni.us/cam-link
โ Keyboard:* https://geni.us/mech-keyboard
โ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ โค๏ธ Support ]=-
โ per Video: https://www.patreon.com/join/liveoverflow
โ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ ๐ Social ]=-
โ Twitter: https://twitter.com/LiveOverflow/
โ Website: https://liveoverflow.com/
โ Subreddit: https://www.reddit.com/r/LiveOverflow/
โ Facebook: https://www.facebook.com/LiveOverflow/
-=[ ๐ P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#ReverseEngineering #CTF
Other Videos By LiveOverflow 2016-08-23 The HTTP Protocol: GET /test.html - web 0x01 2016-08-19 HTML + CSS + JavaScript introduction - web 0x00 2016-08-16 Format String Exploit and overwrite the Global Offset Table - bin 0x13 2016-08-12 NEW VIDEOS ARE COMING - loopback 0x00 2016-04-19 Global Offset Table (GOT) and Procedure Linkage Table (PLT) - bin 0x12 2016-04-09 A simple Format String exploit example - bin 0x11 2016-03-28 Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90 2016-03-16 Live Hacking - Internetwache CTF 2016 - web50, web60, web80 2016-03-10 Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3 2016-03-09 Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2 2016-03-07 Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1 2016-02-24 pwnable.kr - Levels: fd, collision, bof, flag 2016-02-16 Reverse engineering C programs (64bit vs 32bit) - bin 0x10 2016-02-10 Doing ret2libc with a Buffer Overflow because of restricted return pointer - bin 0x0F 2016-02-03 Buffer Overflows can Redirect Program Execution - bin 0x0D 2016-02-03 First Exploit! Buffer Overflow with Shellcode - bin 0x0E 2016-01-29 First Stack Buffer Overflow to modify Variable - bin 0x0C 2016-01-27 Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference) 2016-01-25 Smashing the Stack for Fun and Profit - setuid, ssh and exploit.education - bin 0x0B 2016-01-22 The deal with numbers: hexadecimal, binary and decimals - bin 0x0A 2016-01-15 Syscalls, Kernel vs. User Mode and Linux Kernel Source Code - bin 0x09
Tags: live hacking
live ctf
buffer overflow
hacking
let's hack
exploitation
exploit
xss
shellcode
hacker
tutorial
ctf
bkpctf
boston keyparty
bostonkeyparty
bostonkey.party
bostonkeyparty.net
pwnable
pwn
cookbook
ida
idapro
reverse engineering
reversing
heap exploit
use after free
use-after-free