VOD - TryHackMe! Buffer Overflow Prep

Поделиться
HTML-код
  • Опубликовано: 22 окт 2024
  • For more content, subscribe on Twitch! / johnhammond010
    If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    PayPal: paypal.me/john...
    E-mail: johnhammond010@gmail.com
    Discord: johnhammond.or...
    Twitter: / _johnhammond
    GitHub: github.com/Joh...
    If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/g... (disclaimer, affiliate link)

Комментарии • 36

  • @Tib3rius
    @Tib3rius 3 года назад +61

    Ohhhh, you did my room! I'll have to watch and see what you thought. 😀

    • @jed3544
      @jed3544 3 месяца назад +1

      What did you think of his process?

  • @retfede
    @retfede 3 года назад +2

    Love this. It’s so organic. It’s nice to see you solve it live and interact with people

  • @peepers46
    @peepers46 3 года назад +1

    You are awesome. I’m doing the Beginning classes right now and I’m learning so much from you. Thank you

  • @AelurtGaming
    @AelurtGaming 3 года назад +2

    Getting to watch this live and ask questions in the moment helped me learn tons. Thanks John!

  • @jareda8943
    @jareda8943 3 года назад +6

    Thank you for doing this room. I've been stuck on it for almost over 2 weeks and whenever I attempt it, my head hurts. Its around 30:00 that I got stuck so I thank you so much for explaining it

  • @jvr8360
    @jvr8360 3 года назад

    Thanks, helped me understand buffer overflow a bit more

  • @meetkumarpatel9538
    @meetkumarpatel9538 3 года назад +1

    With Zero knowledge of security I had watch whole tutorial but it’s so interesting 😀

  • @bilbot8195
    @bilbot8195 2 года назад

    Awesome video! I understood tons. However, I don't see the point in putting all the C minus the length of the previous, as if total length of all that should not go beyond 5000, when you decided that value of 5000 yourself in the first place. Could have been 6000 or 7000... so whatever length the Cs make does not matter?

  • @angelaguirre9384
    @angelaguirre9384 Год назад

    John, thank you so much for this! You rock brother!

  • @MrChrisLia
    @MrChrisLia 2 года назад

    Hi John, I basically memorized the way you did it and not the TryHackMe way, however I ran into an issue on Overflow 9. There. is an extra bad character that I couldn't find using your method, it seems like I couldn't just write down the first character out of order for every bad character. One of them were actually 2 bad characters next to each other. Is there any way to get around it using your method? Or should I redo the room with the TryHackMe method?

  • @hat0601
    @hat0601 3 года назад

    Hi John,
    I could use your steps for overflow1 and 2, but in overflow3, badchars doesn't show up in stack, it just shows AAAA. Do you know why? Thanks

  • @shahrukhtramboo6781
    @shahrukhtramboo6781 2 года назад +1

    Hi,
    Thanks for this awesome video, you missed some bad characters, and because of that i was not able to get a reverse shell
    i think mona handles that well
    there was xa1 too!
    my payload had that in it.

  • @Masterism88
    @Masterism88 3 года назад

    Do the THM free rooms give dedicated rooms to subscribers, or is that only with subscriber only rooms?

  • @SALTINBANK
    @SALTINBANK 3 года назад

    Thanks to tib3rius and you john because i was stuck on some overflows on the stack ...

  • @corel965
    @corel965 3 года назад

    Man you are so positive person, and such a knowledge man that's insane 🤓🤓🤓

  • @crypto9459
    @crypto9459 2 года назад +1

    What type of music is playin? I dig it

  • @codezero1015
    @codezero1015 Год назад +1

    When I wrote your script to crash the immunity debugger it was not crashing every time it said error send failed or error recv failed even after setting A*20000

    • @canaldoreno
      @canaldoreno 9 месяцев назад

      im stuck on 29:15 becaus of that what have u done to fix?

  • @imranthoufeeque
    @imranthoufeeque 3 года назад

    In the vulnserver video you said we need to have /.:/ after the TRUN. But here why arent we using the same after the initial command??????......

  • @swivels
    @swivels 3 года назад +2

    My flow is so intense, it'll overload your buffer,
    Corrupt your stack pointer, making all your data suffer

  • @SzymekCRX
    @SzymekCRX 3 года назад +1

    Content as good as the background music :)

  • @rationalbushcraft
    @rationalbushcraft 2 года назад

    I'm just thrilled I'm not the only one to have two vpn's open to THM and getting angry at the connection when it is really my fault.

  • @Synceditxboxoffice
    @Synceditxboxoffice 3 года назад

    always learning something new its great

  • @peepers46
    @peepers46 3 года назад

    Yeah, you’re getting my Twitch Prime sub tomorrow

  • @retr0288
    @retr0288 2 года назад

    I understood everything except for the badchars part.
    Could someone just briefly explain why enumerate them and also a better way to do so rather than manually sitting thru it because I'm sure I'll mess it up if I do it that way??

  • @jesusibarra4055
    @jesusibarra4055 3 года назад

    yo I really like all the work you do , thanks for being my inspiration for getting in to cyber security

  • @TheKSH991
    @TheKSH991 3 года назад

    Is there other oscp prep on try hack me ?

  • @viv_2489
    @viv_2489 3 года назад

    Loving the content

  • @killerskincanoe
    @killerskincanoe 3 года назад +2

    Prime subbd on twitch

  • @earthlyelder
    @earthlyelder 2 года назад

    Thank you bro

  • @mrgamer-lu1im
    @mrgamer-lu1im 3 года назад

    The reason the Real Time Protection turned on/off is because you are administrator on the system.

  • @mayureshgadekar2860
    @mayureshgadekar2860 Год назад

    this is so f***ing hard

  • @dopeviews
    @dopeviews 3 года назад

    NICE