1st video from the "Practical Buffer Overflow Exploitation" course covering the basics of Binary Exploitation. In this video we'll increase our attack sophistication, instead of DoSing the binary/server (last video), we'll overwrite an important local variable on the stack in order to bypass a "secure" login. We'll use checksec, ghidra, pwndbg and also get our first look at pwntools! Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #BinaryExploitation #BufferOverflow #BinExp #RE #Pwn #PwnTools
Find the binary files, source code and scripts to go with the series @ https://github.com/Crypto-Cat/CTF/tree/main/pwn/binary_exploitation_101
👷♂️Resources🛠
https://cryptocat.me/resources
↢Chapters↣
Start: 0:00
Basic File Checks: 0:51
Exploit Buffer Overflow to Bypass Login: 3:09
Review Source Code: 5:04
Disassemble with Ghidra: 6:28
Debug with GDB-PwnDbg: 8:35
Disclaimer (I'm a n00b lol xD): 12:26
First PwnTools Script: 12:50
End: 14:48