Buffer Overflow Tutorial in Windows with Exploit

Поделиться
HTML-код

Комментарии • 79

  • @loongaming105
    @loongaming105 6 лет назад +2

    So glad you are uploading again. Was pretty much the second coming when I saw that little (1) next to your name in my sub box. Keep up the excellent work my man, love your videos.

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад

      Haha, Thanks for watching LoonGaming!

  • @d-e-v-esh
    @d-e-v-esh 6 лет назад +5

    👍👍
    Glad you're uploading again after a long time...

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад +2

      Far too long, more good stuff coming.

  • @dulalsandip7950
    @dulalsandip7950 6 лет назад +1

    i had only known about buffer overflow,but u make me theoretical as well as practical concept ...thanks sir..hope for more advanced courses and exploitation

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад +1

      Always more to come! Thanks for watching!

  • @janekmachnicki2593
    @janekmachnicki2593 Год назад

    Brilliant mate .Easy to learn .Thanks

  • @marcchamizogilabert5766
    @marcchamizogilabert5766 6 лет назад

    Cool to have you back!

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад

      Cool to be back, thanks for watching!

  • @itsRavenium
    @itsRavenium 2 года назад

    Structured, easy to follow, and very informational. Thank you for your work!

  • @ytg6663
    @ytg6663 Год назад

    You explain it better than most paid courses Like oscp 😅😅

  • @yuck871
    @yuck871 3 года назад

    Hey, great video. Thanks a lot.
    I have one question: where did you find the shellcode for the calculator? Couldn't find it on shellstorm

  • @always-there-for-your-help7446
    @always-there-for-your-help7446 6 лет назад +3

    how your exploit work after ASLR , Safeseh , Rebase all is present in kernel32.dll module

    • @sent4dc
      @sent4dc 5 лет назад +3

      good point. If he is running this exploit on WinXP then it will work. But not on Win10. He must have disabled all security mitigations. Pretty much ASLR, Stack Canaries and DEP, all by themselves will kill his exploit. And these were present since Windows 7, if I'm not mistaking it.

  • @phoenix-zb1cx
    @phoenix-zb1cx 6 лет назад

    Great to see you're back. Awesome job as always and look forward to more videos

  • @walkerjw81
    @walkerjw81 2 года назад

    Thank you! I thought I was ready for this class I'm currently taking. I am not, but I know this video is helping. I hope you have more I can reference!

  • @AlienAndrew51
    @AlienAndrew51 6 лет назад

    After getting bored of metasploit it's nice to become a part of the red team community. Awesome video!

  • @marionauno8850
    @marionauno8850 6 лет назад

    Glad you are back
    !

  • @smtmssmtms
    @smtmssmtms 6 лет назад

    thanks for the video! I have a question: how to overflow a String? I know the Max size is 2^32 (about 2GBytes of char information)

  • @younesmohssen8158
    @younesmohssen8158 5 лет назад

    What if you wanted to exploit the same vulnerability, but thru the internet. How would I go about that?

  • @purekillah
    @purekillah 5 лет назад

    7:48 78 is the HEX value of the letter x. Not the decimal value.

  • @julsssssss
    @julsssssss 4 года назад

    how do I locate other shell codes for the payload; aside from calc.exe

  • @X3eRo0
    @X3eRo0 6 лет назад

    Thank you for coming back

  • @bachirtrading5866
    @bachirtrading5866 6 лет назад

    Great video Hackhappy. Please we need more videos like that

  • @sent4dc
    @sent4dc 5 лет назад +2

    How would this work with any of ASLR, DEP and stack Canaries?
    These are enabled by default in VS compiler and in OS since Win 7 by default.
    Your exploit may run on Windows XP pre-SP2 and that's it.

    • @cromatico524
      @cromatico524 5 лет назад

      There are a lot of techinics to bypass those protections. For example, for stack cookie (canary) you can use memory leak bugs (format string, for example) and brute-force is alson a option for canary, but works for ASLR too!

  • @rimengineers
    @rimengineers 3 года назад

    Great video!

  • @allesbanane2329
    @allesbanane2329 3 года назад +2

    great tutorial but how did you get this shellcode? im having a had time finding working shellcode for windows 10...

    • @fancywaifu9821
      @fancywaifu9821 3 года назад

      U can use msfvenom

    • @Ali-Aljufairi
      @Ali-Aljufairi Год назад

      @@fancywaifu9821 is it possible share the command to use when use msfvenom because it didn't work for me

  • @RedditNovelties
    @RedditNovelties 6 лет назад

    Welcome back!

  • @KeplerAurem6
    @KeplerAurem6 6 лет назад

    Glad to have ya back woot woot! Let's get hackin

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад +1

      Crack those knuckles, time to get to work!

  • @premtimramadani6929
    @premtimramadani6929 6 лет назад

    Have anyone tried this for a reverse shell? Because it opens calculator but it does not open e reverse shell connection.

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад

      You have to replace the calculator shellcode with a reverse shell, shellcode.

    • @premtimramadani6929
      @premtimramadani6929 6 лет назад

      @@HackhappyOrg I know that but it did not work for me, i just guess there were some errors in my shellcode.

    • @nordstromnordstrom7453
      @nordstromnordstrom7453 5 лет назад

      @@premtimramadani6929 Bad Chars probably broke your code.

  • @younesmohssen8158
    @younesmohssen8158 5 лет назад

    What does the \xc4 mean in python
    And what does the b mean in python

    • @BibendiYT
      @BibendiYT 5 лет назад

      I'm 3 months late so you probably already figured these out, but just in case you haven't:
      \xC4 in python is just a way of notating 0xC4 (Hex representation of 196) in python, he is just using it as junk bytes, it could be any value.
      the 'b' before a string just makes the string a byte

  • @ФёдорЛосевский
    @ФёдорЛосевский Год назад

    Perfect!

  • @olynerikson3723
    @olynerikson3723 6 лет назад

    he returns

  • @oribarmatz5840
    @oribarmatz5840 6 лет назад

    That is so wierd how does windows allows executable stack? I thaught that nowadays maschines have restriction for that...

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад

      It does have protections, however, there are scenarios in which the stack can be executable.

  • @fadiallo1
    @fadiallo1 6 лет назад

    from where can i get the ShellCode ?

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад

      It's in the video description.

    • @fadiallo1
      @fadiallo1 6 лет назад

      i mean if i need to run another program not calculate
      i mean how to conversion the program to shell code
      is that impossible ?

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад

      I'm going to make a video on creating shell code soon.

    • @fadiallo1
      @fadiallo1 6 лет назад

      thanks
      and sorry
      i was angry in this some days
      i dunno why

    • @Ali-Aljufairi
      @Ali-Aljufairi Год назад

      @@HackhappyOrg did you do it ? I search Didn't find

  • @crlfff
    @crlfff 5 лет назад

    Beautiful.

  • @1EMT
    @1EMT 6 лет назад +1

    Is that a HackHappy video?

  • @deadhacksteam7998
    @deadhacksteam7998 6 лет назад

    Ahah thanks! Can you show how to do it directly into a running process?

  • @dungduquoc1583
    @dungduquoc1583 6 лет назад

    Nice Man!, You can make a series video about Buffer Overflow(Stack, Heap) on win32 and demo 1days exploitation creative about CVE or you demo exploit Browser, Microsoft office, Thank you so much

  • @emircanasadi6337
    @emircanasadi6337 6 лет назад

    good work, nice video

  • @SecurityTalent
    @SecurityTalent 3 года назад

    So so thanks

  • @yourjoyousbluet8
    @yourjoyousbluet8 6 лет назад +1

    holy balls, this is amazing.

  • @sontapaa11jokulainen94
    @sontapaa11jokulainen94 5 лет назад

    7:50 You mean hexadecimal?

  • @thomasjefferson8629
    @thomasjefferson8629 4 года назад

    Yikes. After 85 years of Windows development, this is still where we're at. I didn't see you switch permission levels or anything. You'd think it wouldn't take a genius to get the OS to stop sending instructions as soon as a program has a critical data allocation error. Might slow it down, yeah, but let's be real, it's Windows

  • @zanityplays
    @zanityplays 6 лет назад

    Great video

  • @ibrahima9123
    @ibrahima9123 3 года назад

    great

  • @angusyoung8845
    @angusyoung8845 5 лет назад +1

    nice!!!!!!!!!!!!!!extremly nice!!!!!!!!!!!!!!!!! can you offer us more tutorial about linux and windows kernel exploit such as heap overflow,UAF,type obfuscate,format string and so on?like HEVD?

  • @segurançaCyber0
    @segurançaCyber0 6 лет назад

    cria Keylogger para windows

    • @HackhappyOrg
      @HackhappyOrg  6 лет назад

      One day I'll cover this. Thanks for watching.

  • @OEFarredondo
    @OEFarredondo 5 лет назад

    I miss softICE and blackICE

  • @darksoul.0x7
    @darksoul.0x7 6 лет назад

    You are uploading videos