Speedrun Hacking Buffer Overflow - speedrun-001 DC27

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=gBL6IzwIjuA



Duration: 10:57
49,259 views
2,079


Simple buffer overflow speedrun challenge, exploited with a ROP chain generated by Ropper. And analyse the timeline.

blog: https://liveoverflow.com/speedrun-hacking-buffer-overflow-speedrun-001-dc27-2/

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* https://geni.us/ntg3b
β†’ Graphics tablet:* https://geni.us/wacom-intuos
β†’ Camera#1 for streaming:* https://geni.us/sony-camera
β†’ Lens for streaming:* https://geni.us/sony-lense
β†’ Connect Camera#1 to PC:* https://geni.us/cam-link
β†’ Keyboard:* https://geni.us/mech-keyboard
β†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
defcon
def con
black hat
hacking
speedrun
dc27
ctf
capture the flag
defcon qualifier
ctf team
pwn
pwnable
linux
buffer overflow
static binary
gdb
exploit
python
ghidra
reverse engineering
return pointer
ropper
rop chain