So glad you are uploading again. Was pretty much the second coming when I saw that little (1) next to your name in my sub box. Keep up the excellent work my man, love your videos.
i had only known about buffer overflow,but u make me theoretical as well as practical concept ...thanks sir..hope for more advanced courses and exploitation
good point. If he is running this exploit on WinXP then it will work. But not on Win10. He must have disabled all security mitigations. Pretty much ASLR, Stack Canaries and DEP, all by themselves will kill his exploit. And these were present since Windows 7, if I'm not mistaking it.
Thank you! I thought I was ready for this class I'm currently taking. I am not, but I know this video is helping. I hope you have more I can reference!
How would this work with any of ASLR, DEP and stack Canaries? These are enabled by default in VS compiler and in OS since Win 7 by default. Your exploit may run on Windows XP pre-SP2 and that's it.
There are a lot of techinics to bypass those protections. For example, for stack cookie (canary) you can use memory leak bugs (format string, for example) and brute-force is alson a option for canary, but works for ASLR too!
I'm 3 months late so you probably already figured these out, but just in case you haven't: \xC4 in python is just a way of notating 0xC4 (Hex representation of 196) in python, he is just using it as junk bytes, it could be any value. the 'b' before a string just makes the string a byte
Nice Man!, You can make a series video about Buffer Overflow(Stack, Heap) on win32 and demo 1days exploitation creative about CVE or you demo exploit Browser, Microsoft office, Thank you so much
Yikes. After 85 years of Windows development, this is still where we're at. I didn't see you switch permission levels or anything. You'd think it wouldn't take a genius to get the OS to stop sending instructions as soon as a program has a critical data allocation error. Might slow it down, yeah, but let's be real, it's Windows
nice!!!!!!!!!!!!!!extremly nice!!!!!!!!!!!!!!!!! can you offer us more tutorial about linux and windows kernel exploit such as heap overflow,UAF,type obfuscate,format string and so on?like HEVD?
So glad you are uploading again. Was pretty much the second coming when I saw that little (1) next to your name in my sub box. Keep up the excellent work my man, love your videos.
Haha, Thanks for watching LoonGaming!
👍👍
Glad you're uploading again after a long time...
Far too long, more good stuff coming.
i had only known about buffer overflow,but u make me theoretical as well as practical concept ...thanks sir..hope for more advanced courses and exploitation
Always more to come! Thanks for watching!
Brilliant mate .Easy to learn .Thanks
Cool to have you back!
Cool to be back, thanks for watching!
Structured, easy to follow, and very informational. Thank you for your work!
You explain it better than most paid courses Like oscp 😅😅
Hey, great video. Thanks a lot.
I have one question: where did you find the shellcode for the calculator? Couldn't find it on shellstorm
did you find it ?
how your exploit work after ASLR , Safeseh , Rebase all is present in kernel32.dll module
good point. If he is running this exploit on WinXP then it will work. But not on Win10. He must have disabled all security mitigations. Pretty much ASLR, Stack Canaries and DEP, all by themselves will kill his exploit. And these were present since Windows 7, if I'm not mistaking it.
Great to see you're back. Awesome job as always and look forward to more videos
Thanks for watching phoenix.
Thank you! I thought I was ready for this class I'm currently taking. I am not, but I know this video is helping. I hope you have more I can reference!
After getting bored of metasploit it's nice to become a part of the red team community. Awesome video!
Glad you are back
!
Thanks for watching Mario!
thanks for the video! I have a question: how to overflow a String? I know the Max size is 2^32 (about 2GBytes of char information)
What if you wanted to exploit the same vulnerability, but thru the internet. How would I go about that?
7:48 78 is the HEX value of the letter x. Not the decimal value.
how do I locate other shell codes for the payload; aside from calc.exe
Thank you for coming back
Glad to be back!
Great video Hackhappy. Please we need more videos like that
muhamad bachir More to come!
How would this work with any of ASLR, DEP and stack Canaries?
These are enabled by default in VS compiler and in OS since Win 7 by default.
Your exploit may run on Windows XP pre-SP2 and that's it.
There are a lot of techinics to bypass those protections. For example, for stack cookie (canary) you can use memory leak bugs (format string, for example) and brute-force is alson a option for canary, but works for ASLR too!
Great video!
great tutorial but how did you get this shellcode? im having a had time finding working shellcode for windows 10...
U can use msfvenom
@@fancywaifu9821 is it possible share the command to use when use msfvenom because it didn't work for me
Welcome back!
Thanks, glad to be back!
Glad to have ya back woot woot! Let's get hackin
Crack those knuckles, time to get to work!
Have anyone tried this for a reverse shell? Because it opens calculator but it does not open e reverse shell connection.
You have to replace the calculator shellcode with a reverse shell, shellcode.
@@HackhappyOrg I know that but it did not work for me, i just guess there were some errors in my shellcode.
@@premtimramadani6929 Bad Chars probably broke your code.
What does the \xc4 mean in python
And what does the b mean in python
I'm 3 months late so you probably already figured these out, but just in case you haven't:
\xC4 in python is just a way of notating 0xC4 (Hex representation of 196) in python, he is just using it as junk bytes, it could be any value.
the 'b' before a string just makes the string a byte
Perfect!
he returns
w00t! Thanks for watching OLYN!
HackHappy you responding made my day.
That is so wierd how does windows allows executable stack? I thaught that nowadays maschines have restriction for that...
It does have protections, however, there are scenarios in which the stack can be executable.
from where can i get the ShellCode ?
It's in the video description.
i mean if i need to run another program not calculate
i mean how to conversion the program to shell code
is that impossible ?
I'm going to make a video on creating shell code soon.
thanks
and sorry
i was angry in this some days
i dunno why
@@HackhappyOrg did you do it ? I search Didn't find
Beautiful.
Is that a HackHappy video?
w00ty w00!
Ahah thanks! Can you show how to do it directly into a running process?
Nice Man!, You can make a series video about Buffer Overflow(Stack, Heap) on win32 and demo 1days exploitation creative about CVE or you demo exploit Browser, Microsoft office, Thank you so much
Good ideas! Thanks for watching!
good work, nice video
Thanks for watching!
So so thanks
holy balls, this is amazing.
7:50 You mean hexadecimal?
Yikes. After 85 years of Windows development, this is still where we're at. I didn't see you switch permission levels or anything. You'd think it wouldn't take a genius to get the OS to stop sending instructions as soon as a program has a critical data allocation error. Might slow it down, yeah, but let's be real, it's Windows
Great video
Thanks for watching Zanity Plays!
great
nice!!!!!!!!!!!!!!extremly nice!!!!!!!!!!!!!!!!! can you offer us more tutorial about linux and windows kernel exploit such as heap overflow,UAF,type obfuscate,format string and so on?like HEVD?
cria Keylogger para windows
One day I'll cover this. Thanks for watching.
I miss softICE and blackICE
You are uploading videos
Let's hope it becomes a trend.