Uncrackable Program? Finding a Parser Differential in loading ELF - Part 2/2 - bin 0x08

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=OZvc-c1OLnM



Duration: 8:04
114,145 views
2,246


Can programs be uncrackable? Let's try to find some anti-debugging tricks.

https://www.sentinelone.com/blog/breaking-and-evading/
http://blog.ioactive.com/2012/12/striking-back-gdb-and-ida-debuggers.html?m=1
PoC||GTFO Journal # 0x00

-=[ 🔴 Stuff I use ]=-

→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.




Other Videos By LiveOverflow


2016-02-24pwnable.kr - Levels: fd, collision, bof, flag
2016-02-16Reverse engineering C programs (64bit vs 32bit) - bin 0x10
2016-02-10Doing ret2libc with a Buffer Overflow because of restricted return pointer - bin 0x0F
2016-02-03Buffer Overflows can Redirect Program Execution - bin 0x0D
2016-02-03First Exploit! Buffer Overflow with Shellcode - bin 0x0E
2016-01-29First Stack Buffer Overflow to modify Variable - bin 0x0C
2016-01-27Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
2016-01-25Smashing the Stack for Fun and Profit - setuid, ssh and exploit.education - bin 0x0B
2016-01-22The deal with numbers: hexadecimal, binary and decimals - bin 0x0A
2016-01-15Syscalls, Kernel vs. User Mode and Linux Kernel Source Code - bin 0x09
2016-01-12Uncrackable Program? Finding a Parser Differential in loading ELF - Part 2/2 - bin 0x08
2016-01-08Uncrackable Programs? Key validation with Algorithm and creating a Keygen - Part 1/2 - bin 0x07
2016-01-05Simple Tools and Techniques for Reversing a binary - bin 0x06
2016-01-04ROP with a very small stack - 32C3CTF teufel (pwnable 200)
2015-12-31Abusing the exception handler to leak flag - 32C3CTF readme (pwnable 200)
2015-12-29Reversing and Cracking first simple Program - bin 0x05
2015-12-24How a CPU works and Introduction to Assembler - bin 0x04
2015-12-22Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
2015-12-21Writing a simple Program in Python - bin 0x03
2015-12-17Writing a simple Program in C
2015-12-14Introduction to Linux - Installation and the Terminal - bin 0x01



Tags:
live hacking
live ctf
buffer overflow
let's hack
exploitation
shellcode
hacker
reversing
reverse-engineering
cracking
crackme
radare2
gdb
uncrackable
stop cracks
stop hackers
binary loading
parser differential
langsec
anti debugging
prevent reverse engineering
stop reverse engineering