VULNSERVER Exploit: HTER w/ Assembly & Shellcode

Поделиться
HTML-код
  • Опубликовано: 9 янв 2025

Комментарии • 89

  • @vexraill
    @vexraill 4 года назад +35

    This was a great video, didn't even realize I had been watching for 30 minutes. You explain the topics in a way that is very interesting yet still very simple and I love it. Great work.

    • @_JohnHammond
      @_JohnHammond  4 года назад +7

      Thank you so much, I really appreciate the kind words! I was worried with a long 30 minute video it would draw some people away, but hopefully it's all still explained and not too fast and too slow. Thanks again!

  • @cocosloan3748
    @cocosloan3748 4 года назад +1

    Doesnt surprise me that you know this..It surprises me how well you manage to explain it so we get it! Thanks a bunch!

  • @moebob24
    @moebob24 3 года назад +2

    John Hammond is very underrated! I recently discovered this channel and I've been binging CTF videos. But you gotta do more malware videos! Those are awesome!

  • @toplist2613
    @toplist2613 4 года назад

    Really enjoying the recent content John. Thank you for your time!

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Thanks for the kind words, and thanks for watching! Guess I'll have to put out more Vulnserver super soon! :D

  • @sakhilevilakati1
    @sakhilevilakati1 4 года назад

    love your videos. learning a lot. keep crushing it

  • @stryker2k2
    @stryker2k2 3 года назад

    A) Awesome
    B) Use less tools and more hand-crafted code
    C) ❤
    D) I liked and subscribed

  • @Gravitized
    @Gravitized 4 года назад +1

    Thank you, this was very informative, and well presented.

  • @ashrafulalim1272
    @ashrafulalim1272 4 года назад +1

    Please make a video for OSCP preparation 2020 (self study guide before purchasing from them) . Thanks

  • @sabertoothlei
    @sabertoothlei 4 года назад

    awesome tutorial John.. Thank you !!

  • @gregor5543
    @gregor5543 4 года назад +1

    Excellent video and explanations of what you were doing. How would you modify this attack if data execution prevention was used by the target?

  • @PaartyMann
    @PaartyMann 4 года назад

    Great work good sir. Thank you for the content!

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Thank you! And thanks for watching!

  • @sinwolf5539
    @sinwolf5539 4 года назад

    Awesome video John !!

  • @mrhappysmiley2968
    @mrhappysmiley2968 4 года назад

    This was amazing. Really loved your explanations!

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Very happy to hear that, thank you so much for watching!

    • @henrylecompte4533
      @henrylecompte4533 4 года назад

      John Hammond Amazing Explanations

  • @ino145
    @ino145 4 года назад +4

    Wow, this is awesome and crazy. :D I'd love to reverse shell into my brother pc in the other room and annoy him.. But I've no idea how to start. :D

  • @arnabthakuria2243
    @arnabthakuria2243 3 года назад

    Hey John great video . Where can i find the outro music

  • @Urbancorax2
    @Urbancorax2 4 года назад

    thank you for video! it's just great!

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Thanks so much, and thanks for watching!

  • @sakhilevilakati1
    @sakhilevilakati1 4 года назад

    Please do a Q&A video.

  • @JamesTanCC
    @JamesTanCC 4 года назад

    Was playing with this and spike. Your explanation of boofuzz is awesome.

    • @_JohnHammond
      @_JohnHammond  4 года назад +1

      Happy to hear that! Thanks so much!

  • @DigitalicaEG
    @DigitalicaEG 4 года назад

    Wow, I learned a lot. Thanks you!

  • @stevieberg2540
    @stevieberg2540 4 года назад +1

    Great video, John! Really good explanation. Is the buffer overflow part from OSCP exam similar to what you've showed us here? Do you need to do fuzzing as well?

  • @decoder6878
    @decoder6878 3 года назад

    Wonderful.

  • @inspirationeveryday1175
    @inspirationeveryday1175 3 года назад +1

    Hi john 👋 please why you use boofuzz why not socket library i know is a dumb question but that all..
    Any way …… i cannot use socket to exploit vulnserver and it is bad to use it ?
    Or socket is just basic ? And what is the Realy work of Boofuzz

  • @ncb4_69
    @ncb4_69 4 года назад

    underrated

  • @thev01d12
    @thev01d12 4 года назад +4

    Hey john, have you ever thought about doing a buffer overflow video bypassing dep and aslr with some ret2libc attack or a SEH overflow. Great video tho :)

    • @_JohnHammond
      @_JohnHammond  4 года назад +7

      I've shown a few ret2libc things on the Linux side of the house -- and I can certainly show a SEH overflow with some of the other Vulnserver functions. Thanks so much, and thanks for watching!

    • @bugr33d0_hunter8
      @bugr33d0_hunter8 4 года назад +1

      Right on, right on.😜

  • @HK-sw3vi
    @HK-sw3vi 4 года назад

    how did you get that cli pwn tool? been trying their installation docs but to no avail

  • @juliantan3432
    @juliantan3432 4 года назад

    Loved this video! Will you be making more videos for the other Vulnserver commands?

  • @sontapaa11jokulainen94
    @sontapaa11jokulainen94 4 года назад +1

    13:00 But the data is in ascii so a lot of "1" characters were sent but the number 1 in ascii corresponds to 0x31, but the eip shows 0x11? I think you made a mistake here.
    Edit: Oh. You realized it. Never mind.

    • @_JohnHammond
      @_JohnHammond  4 года назад

      No, yeah, that is the gimmick for this exploit. I may have fumbled a few words trying to explain that, since it is such an odd thing, but the issue IS that the literal 1's are being stored in EIP. Thanks for watching!

    • @sontapaa11jokulainen94
      @sontapaa11jokulainen94 4 года назад

      @@_JohnHammond Yeah. I wonder why they didn't just leave it like an A comes out as 0x41. That would have been a lot more realistic. Thanks for responding to my comment btw..

  • @leon1985ist
    @leon1985ist 4 года назад

    Just try to get the overflow course where do I put the promocode

  • @rjrrclaro
    @rjrrclaro 3 года назад

    Awesome

  • @MrBboyblaze
    @MrBboyblaze 4 года назад

    I life boofuzz, using that for my OSCP BO!!! Thanks John!

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Happy to hear that, thank you so much! It might certainly come in handy for OSCE!! Thanks for watching!

  • @x3ph_
    @x3ph_ 4 года назад

    Instantly purchased 0verfl0w's beginner malware course. Ty! And that walkthrough was amazing, i learned a lot thank you John!

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Hell yeah! Very happy to hear that, thank you so much! I am sure 0verfl0w is very pleased as well! Thanks for watching!

  • @mahdihasan9399
    @mahdihasan9399 4 года назад

    which version off ubuntu are you using ?

  • @bugr33d0_hunter8
    @bugr33d0_hunter8 4 года назад

    Hey how come you never shout out to me? I praise you, encourage, uplift, and how great you are, how far you've come, it's a big deal and your doing awesome. I've learned so much from you. I'm not mr. Popullar by any means. But a shout out here and there would be cool. I'd like to collaborate with you and a few others. I'm gonna talk to Paul asadorian from SecWeekly, an get you a segment on the show. You can use it in your portfolio. Make sure to take efficient notes, that a huge thing. ,I'm liking what your doimg on shellcoding. I got the book, it's pretty big, lol. But I'll get through it.

    • @_JohnHammond
      @_JohnHammond  4 года назад +1

      Hey brother -- ask and you shall receive! Next video, I'll be sure to give you a shout-out. :)
      (PS - if you do talk to Paul and can squeeze in that opportunity, I would be eternally grateful!! He does awesome stuff.)

    • @bugr33d0_hunter8
      @bugr33d0_hunter8 4 года назад

      @@_JohnHammond Hell yeah bro. Oh I was kidding about the shout out. I just realized by texting and messaging, you can't tell if someone's busting your chops or being sarcastic. That's something only human emotion can capture. Emojis just don't cut it. Lol.

    • @_JohnHammond
      @_JohnHammond  4 года назад

      @@bugr33d0_hunter8 Pfft, I gotchu anyway ;)

  • @picious
    @picious 4 года назад

    what i didn't understand is that , to get remote access in the system , we used a debugger on that system, right? so we had prior access to it. ??? / Either way, thanks for the video !!

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Well -- you are right, since I am debugging on the actual machine, yes, we have access -- though this is really for educational purposes and a setup you might find a certification exam... you would have a copy of the binary on a debugging server, and then after you have crafted your exploit against the debugging server, you can use it on the real "target" production server that you did not have otherwise access to. Thanks for watching!

    • @picious
      @picious 4 года назад

      @@_JohnHammond Thanks for the reply,, appreciated !!! :)

  • @TheSparkart
    @TheSparkart 4 года назад

    I don't get it.... how do you see where it crashed from when it is remote? How do you run a debugger? If you could run the debugger wouldn't you already have access to the system?

    • @_JohnHammond
      @_JohnHammond  4 года назад

      You don't see where it crashed when it is remote -- you do have to run a debugger locally. Typically, in a challenge you would be given a binary to work with and test with, develop your exploit on a local debugging machine, separate from the target machine. In this case I just used the debugging machine and the target machine as the same box, for easy demonstration and infrastructure. Thanks for watching!

  • @gabedoestech
    @gabedoestech 4 года назад +1

    What keyboard do you use, John? I like the sound of it.

    • @_JohnHammond
      @_JohnHammond  4 года назад +1

      I'm just on my DELL XPS 15 laptop ahaha. Thanks for watching!

    • @gabedoestech
      @gabedoestech 4 года назад +1

      @@_JohnHammond I wasn't wrong after all. I knew it sounded like a laptop or Mac keyboard ha. I wish my mechanical keyboard sounded similar and not like a cheap piece of plastic, which it is lol

  • @coolboyjean
    @coolboyjean 4 года назад

    I loved the video, and now you only filtered out the \x00 (null) but there could've been more bad chars than that, I think you skipped a step where you sent the entire ascii table (hexified) as a payload to check for any other bad characters.

  • @Joshua1_7sc
    @Joshua1_7sc 4 года назад

    Can you show it with Character Server? ;)

  • @mattfowler6504
    @mattfowler6504 4 года назад

    🔥🔥

  • @dxsp1d3r
    @dxsp1d3r 4 года назад

    Are you participating in the sec army ctf 2020 ?

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Admittedly I had not been, no -- how was the CTF? :D

    • @dxsp1d3r
      @dxsp1d3r 4 года назад

      @@_JohnHammond i finished 95
      Could not give my hundred percent because of time difference
      But i really want to learn osint as i could not solve a single challenge
      The ctf is still up if you want to try!!

    • @_JohnHammond
      @_JohnHammond  4 года назад +1

      @@dxsp1d3r Ooooh, I will have to give it a try! Thanks for letting me know!

  • @mcawalid549
    @mcawalid549 4 года назад

    Very awsome

  • @saifallahchakroun6253
    @saifallahchakroun6253 4 года назад

    Bro can you share discord link , it is expired link

  • @PavitraGolchha
    @PavitraGolchha 4 года назад +1

    Is Overflow the same as Live Overflow?

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Nope, sorry, 0verfl0w and Live Overflow are different people!
      Thanks for watching!

  • @sent4dc
    @sent4dc 4 года назад +3

    11:10 "You must be a victim of software counterfeiting" -- someone is using a pirated copy of Windows, hah :)
    It's funny that M$FT can't just say, "Hey, bro, don't pirate our software!" and instead they have to go with politically correct, "Someone must have installed a pirated version of our software on your computer." Funny af.

  • @alexev1795
    @alexev1795 4 года назад

    Grate! Looks easy:) What is about ROP ?

    • @_JohnHammond
      @_JohnHammond  4 года назад

      I'll have to try to do some ROPemporium, that is a great resource and would be good to showcase! Thanks for watching!

  • @LokeshMeena-yi4ol
    @LokeshMeena-yi4ol 4 года назад

    why don't you make your own courses like cryptography,assembly language, malware analysis, reverse engineering ?

    • @_JohnHammond
      @_JohnHammond  4 года назад

      A lot of people are asking for this lately -- I'll see what I can do! Thanks for watching!

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Indicator how to galaxy cAlychin

  • @mathiasferstl3479
    @mathiasferstl3479 4 года назад

    another great Video nur how to buffer overflow when you dont have access to the Server? Sorry im a noob in hacking

  • @Retr-rq9lm
    @Retr-rq9lm 3 года назад

    can you go a little slower? Don't get me wrong the info is great but if you could go a little slower, that would help alot!

  • @docmalitt
    @docmalitt 4 года назад

    thx for the 15% off ;) (u must think about the time difference US/EU when u r doing these cool giveaways please)

  • @rajughorai3909
    @rajughorai3909 4 года назад

    Hey can I get it for free