BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin

Поделиться
HTML-код
  • Опубликовано: 2 дек 2024

Комментарии • 45

  • @singularity1130
    @singularity1130 6 лет назад +80

    Watching your buffer overflow has explained more than the hours of theoretical videos I've watched...
    Thank you.

  • @ryananicholson
    @ryananicholson 6 лет назад +44

    Ive never seen a BO explained in less than 10 mins... Great job!

  • @memomemo2256
    @memomemo2256 5 лет назад +16

    Actually this the best simple detailed explanation for BoF I had ever seen ! Good job

    • @_JohnHammond
      @_JohnHammond  5 лет назад

      Thanks so much, I appreciate all the kind words! Thanks for watching!

  • @mucktheman2720
    @mucktheman2720 6 лет назад +6

    Good work with the quick and easy to follow explanation of a buffer overflow. I've seen them explained in so many different ways and this was concise and to the point. Great work John!

    • @_JohnHammond
      @_JohnHammond  6 лет назад

      Hey thank you, I am really happy to hear that! :D I appreciate the kind words, thanks again!

  • @Sunfyre0x0
    @Sunfyre0x0 4 года назад

    Hands down best BoF video to the point I've come across! You sir are a savior. Thank you

  • @iainkay3630
    @iainkay3630 3 года назад

    Love this. So simple yet so effective. Whilst consuming most of the videos explaining this topic I am left thinking I wish there was a 3x or 4x speed. Not with this though.
    Thanks for a super quick explanation of how to get to it, in this example at least and actually get the overflow done.

  • @sanr6838
    @sanr6838 4 года назад +1

    This is the best example I have seen for a BO

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Thank you so much, and thanks for watching!

  • @electrokid9492
    @electrokid9492 4 года назад

    @John Hammond really love you and your content

  • @L0wLevel01
    @L0wLevel01 4 года назад

    that is actually fantastic, Prof. Hammond !

  • @kbtvn
    @kbtvn 5 лет назад +2

    better way to learn BOF is just watching CTF videos :D . tks for making this

  • @sandra8139
    @sandra8139 2 года назад

    I am see that is trying to be myself and is not has been watched at 4 times in this subscription and membership I joined in the last couple of days alone thanks John

  • @allenxd
    @allenxd 4 года назад +1

    im struggling with bof but damn this made it look easy. thanks!

  • @constantinenabruk1199
    @constantinenabruk1199 6 лет назад

    Amaizing, why others cant explain the bufferoverflows like you? you make this so easy... hours of theory for nothing, in less than 10 minutes you explained id...

  • @6cylbmw
    @6cylbmw 4 года назад

    Awesome explanation. Thank you!

  • @risingofmars1859
    @risingofmars1859 2 года назад

    Nice video and well explained..

  • @jovi___
    @jovi___ 3 года назад

    Thank You!

  • @poluefemus
    @poluefemus Год назад +1

    oh that was easier than i thought lol

  • @OthmanAlikhan
    @OthmanAlikhan Год назад

    Thanks for the video =)

  • @ShubhamPatil-wk4yv
    @ShubhamPatil-wk4yv 6 лет назад +1

    WOWW just wow!!

  • @Akshay1165
    @Akshay1165 2 года назад

    Wooh!!! Thanks

  • @paul2240
    @paul2240 2 года назад

    banger video

  • @Arteko77
    @Arteko77 6 лет назад

    Good to know another way to solve this CTF. I've used objdump and found how many bytes is allocating for buffer.

  • @Foxy10-b6n
    @Foxy10-b6n 2 года назад

    like the title a alot

  • @mikee.
    @mikee. 6 лет назад +4

    Ugh, I was so close to solving it myself...

  • @andrewchiang3139
    @andrewchiang3139 4 года назад

    tysm

  • @AUBCodeII
    @AUBCodeII 2 года назад

    Hi John

  • @marcovalentinoalvarado3290
    @marcovalentinoalvarado3290 2 года назад

    Is it possible to use GDB there and find the specific size of the buffer to avoid doing trial and error trying to find where the buffer is overflowed?

  • @gabrieltheuws8680
    @gabrieltheuws8680 4 года назад

    j'ai rien pigé, tu m'as perdu direct xD

  • @Zuzu-fq2iv
    @Zuzu-fq2iv 3 года назад

    I wonder if you can use GDB on that challenge...

  • @temingtiong8071
    @temingtiong8071 6 лет назад +2

    Can anyone explain to me about the 0x0804853b and ;\x85\x04\x08 ? What are they called and what are they used for ?

    • @ryananicholson
      @ryananicholson 6 лет назад +5

      It's the address of the start of the secretFunction. John is overflowing the buffer and overwriting the return address on the stack so that the program, instead of simply exiting, returns to the secretFunction. The reason ';\x85\x04\x08' is used is because this system is little-endian (en.wikipedia.org/wiki/Endianness#Little-endian tldr: bytes are in reverse order). The ';' may throw you, but that's simply bash printing the actual ASCII value of '3b' (man7.org/linux/man-pages/man7/ascii.7.html). Hope that helps!

  • @yottaoctet
    @yottaoctet Год назад

    Pourquoi n'avons nous pas besoin d'instruction JMP ou CALL ?

  • @petehinch3871
    @petehinch3871 4 года назад

    Can you do more python videos please John

  • @jacoumata
    @jacoumata Год назад

  • @thouhidsec5145
    @thouhidsec5145 6 лет назад +3

    can you please share your story how can you become a hacker

    • @_JohnHammond
      @_JohnHammond  6 лет назад +4

      This is a good idea! Absolutely, I will definitely share my story in a video. :)

    • @thouhidsec5145
      @thouhidsec5145 6 лет назад

      John Hammond ok..I am excited