Remote Code Execution via Tcache Poisoning - SANS SEC 760 "Baby Heap" CTF

Поделиться
HTML-код
  • Опубликовано: 18 окт 2024
  • A video walkthough for SANS SEC 760s "Baby Heap" CTF challenge which involved exploiting a format string vulnerability and a one-byte overflow to poison tcache and gain remote code execution.
    NOTE - There seem to be some slight errors in the video, my apology!
    At 27:50, 0x101 is meant to be 257 not 254
    When explaining the A, M, and P flags for the Heap Chunks, those are supposed to be "bits" not "bytes"
    🔗 Links From Video:
    / 1233119624658481157
    azeria-labs.co...
    👨‍💻 Gear I Use:
    Microphone: Audio Technica AT2020USB+
    Camera: Logitech HD Pro Webcam C920
    Headphones: Shure SE215 (Sound Isolating)
    Keyboard: Ducky One White LED Double Shot PBT (MX Brown)
    Mouse: Logitech G703 Lightspeed
    💻 Social:
    Blog: jhalon.github.io
    Twitter: / jack_halon
    GitHub: github.com/jhalon
    Twitch: / jackhackslive

Комментарии • 18

  • @flyingtiger123
    @flyingtiger123 Год назад

    I was confused by the technique for several days until I came across this .Fabulous video!

  • @shravyabhaskara8003
    @shravyabhaskara8003 2 года назад

    the explanation was soo clear! I struggled with finding the proof of work for a challenge while playing CTF's. Glad I came across this video. Recently been trying to make a challenge based on tcache poisoning. Your video walkthrough really helped! Thanks a lot.

  • @rootedinside106
    @rootedinside106 4 года назад +1

    One of the most informative videos I have seen about heap exploiting! Thanks!

  • @kevinwydler7305
    @kevinwydler7305 10 месяцев назад

    This is soo informative and really well explained! Thank you soo much

  • @antonsonj4995
    @antonsonj4995 Год назад

    Thanks a ton!!! Really helpful video ❤️

  • @mesh3al32
    @mesh3al32 4 года назад +1

    Thank you for the very informative walk-through , best Linux heap exploitation video :)

  • @lazlowcarmichael1829
    @lazlowcarmichael1829 3 года назад

    Absolutely phenomenal video. Illustrative and informative.

  • @TheVampirePlaysMc
    @TheVampirePlaysMc 4 года назад +1

    Really nice vid, learned a lot.
    Can you please explain why do you have to use 0xf8 for initial malloc for the one byte overflow? Couldn't any size exploit the one byte oveflow?
    Another question, when did we exploit tcache? I didn't see where that came into play

    • @texon7631
      @texon7631 4 года назад

      Tcache is a technique use by the heap (as you can see in the vid) to improve heap management, he crearly respond in the video to both of your questions.

  • @pwndumb2903
    @pwndumb2903 3 года назад

    I love the video. Its amazing. Thx. Can you tell me how software you used to create the animations (arrows and text) in vídeo ? I not ask about the exploit because I have to learn a lot to understanding heap exploitation.

  • @ムワ-d7n
    @ムワ-d7n 4 года назад

    Nice walkthrough, more heap exploitation please

  • @manolo_averias
    @manolo_averias 2 года назад

    Great video man, come back

  • @superhero1
    @superhero1 4 года назад

    Great video! Thank you so much.

  • @markusdauberschmidt2969
    @markusdauberschmidt2969 4 года назад

    Which glibc are you using on your system? I don't have the same output using gef/pwndbg on libc2.27 (Ubuntu 18) when freeing the 2nd and 3rd chunk.

  • @fusca14tube
    @fusca14tube 4 года назад

    Hi JackHacks... first of all, thank you for your video. Can you help me? I'm trying to develop an exploit based in your heap exploitation, but my exploit freezes when I send data without '
    '. It only works if I use s.sendlineafter("Data: ", data), but I NEED to use s.sendafter("Data: ", data) (without '
    ') to explore "off by one Overflow" vulnerability. What I am doing wrong? Thanks in advance.

  • @anticharacter
    @anticharacter 4 года назад

    at 27:50, isn't 0x101 in decimal 257 not 254?

    • @JackHacks
      @JackHacks  4 года назад +1

      Yes you would be correct! It would be 257, seems I made a mistake in my script 😅. There seem to be some other errors like when I say "bytes" instead of "bits" - will be putting out a disclaimer note for those soon.

  • @sezarstarscourge7368
    @sezarstarscourge7368 Год назад

    0x101 =257 you did a little listak : 254 ; but its cool