Hacker Techniques Introduction to Buffer Overflows

  Рет қаралды 9,842

Off By One Security

Off By One Security

Жыл бұрын

Пікірлер: 31
@thetruetom9104
@thetruetom9104 9 ай бұрын
thank you for explaining it in details, most youtube videos don't do that, thank you!!!
@OffByOneSecurity
@OffByOneSecurity 7 ай бұрын
I'm glad it helped. I try and make sure the videos on my channel are informative.
@godzab
@godzab Жыл бұрын
I wish this came out a year ago when I was studying for certs that required BoF. This is a great video and thank you for recording it!
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
Exactly, it's great to save people time so they can get to new research. People have heard me say it a million times, about references to FS:[0x30] back when I was learning about shellcode writing. This was 20 years ago and there were no search engine results. Had there been, I'd have saved many hours!
@ketchupflavors6328
@ketchupflavors6328 Жыл бұрын
It was a delight to watch this one Stephen!. Such a great explanation of the basics. Other content creators skip the details. Thank you very much for sharing your knowledge and giving a detailed walk through with diagrams. This channel's gonna grow exponentially. I am sure of it. Cheers!
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
If you have ideas for future videos, let me know...
@NetworkITguy
@NetworkITguy Жыл бұрын
I want to say a lot of content creators see requests for easier content and don't see the ROI for advanced content. Personally would like to see you do whatever it is you want to provide. Given your coverage that isn't too say this wasn't a contribution. - GamozoLabs does a fantastic job of covering fuzzing and optimization research - 0xdf covers advent of code and, like ippsec, does war game boxes on THM, HTB etc. - cts covers memeing coding projects like educational software for skirting around Valve's anti-cheat. - 0x6d696368 ghidra - DuMp-GuY TrIcKsTeR .NET RE - OALabs Malware RE - 247CTF Learned RE - GH Learned RE & tooling - HackerSploit guided general coverage of tools - Dayzerosec application security / vuln research and recaps and so on... What I see that's missing is coverage of more modern exploitation identification and understanding in-depth, like HVCI for example, on KZfaq. Even though there are great research articles by revers.engineering and secret.club sometimes having a visual representation helps. Which is why this channel is so awesome. I recognize that most of the bleeding edge research regarding COOP for Intel's CET or smashing ARM's MTE is reserved for talks or paid trainings. Plus you're first video had Didier Stevens on and that was awesome.
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
@@NetworkITguy Yes, there is a ton of amazing stuff out there! I hope to cover things that have sometimes already been covered, but in a way that makes it more accessible. I have several goals, which also includes what you've suggested above. All the examples you've listed are fantastic. So, one example is to cover some of those same topics, but to try and do an even better (or different style) job when possible. I also want to cover topics that haven't been addressed, such as bringing on Steve Walbroehl recently to cover blockchain tech and things that aren't commonly discussed. Finally, I want to reach the areas you've suggested. I plan to have a coauthor of mine from Gray Hat Hacking on to discuss Hypervisor Exploitation. I plan to have Connor McGarr on to cover some of the Kernel stuff you mention. We'll see who else wants to come on to discuss some other relative areas that you describe. As you said, it gets into a cutting edge space of research where people are potentially under NDA's, or are using it for private trainings, or are keeping it internal as it's super valuable. For example, Apple has recently made things a lot harder with regard to exploitation. If someone finds something, the price tag could reach several million USD. Thanks for checking in and I hope you like the content we bring in the future!
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
Oh, and if you have something you'd like to share, I'm happy to chat about having you on as a guest!
@mesh3al32
@mesh3al32 Жыл бұрын
- set up Chrome v8 engine for vuln research - basic exploitation of v8 in an easy way (other writeups are tough to understand and not easily accessible) - explain Windows mitigations and how to circumvent even theoretically such as (CFG, ACG, Exploit Guard, XFG, CFi, CET, SMEP, hypervisor security HVCI and VBS .. )
@kevin0x90
@kevin0x90 Жыл бұрын
Idea for a video: Practical WinDbg (Preview?) for Vulnerability Research and Exploit Development. E.g. triaging crashes, debugging exploits
@mesh3al32
@mesh3al32 Жыл бұрын
one of the best buffer overflow video!
@dmk1577
@dmk1577 Жыл бұрын
Such an awesome video looking forward to future content
@yandee4275
@yandee4275 11 ай бұрын
Awesome content. Followed your GXPEN course btw. Here for a refresher ;)
@uaman11
@uaman11 5 ай бұрын
dont apologize for the graphics its perfect you dont need anything flashy its just distracting anyway
@morganguesdon2202
@morganguesdon2202 Жыл бұрын
just awesome
@0xSingularity
@0xSingularity 11 ай бұрын
Amazing video, love the way you deliver the content. I’m assuming it comes from your experience in developing and teaching SANS courses! Subbed and looking forward to more videos in the future!
@wingwing2683
@wingwing2683 2 ай бұрын
Thank you very much!
@melonscratcher
@melonscratcher Жыл бұрын
Subscribed !!! Great granular details, feel like I learned something.... Cheers!
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
If you didn't learn anything, I'm failing! :) Happy New Year.
@yrncollo
@yrncollo Жыл бұрын
Great content ;)
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
Thanks!
@dukedadson774
@dukedadson774 Жыл бұрын
where have you been all this while..bro ..damn u good
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
Thanks!
@kevinburke2446
@kevinburke2446 Жыл бұрын
Hope your channel blows up man
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
Thanks!
@JoaquinRamirez
@JoaquinRamirez Жыл бұрын
Buffer Overflow Hacking Tutorial (Bypass Passwords)
55:39
David Bombal
Рет қаралды 68 М.
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
SHE WANTED CHIPS, BUT SHE GOT CARROTS 🤣🥕
00:19
OKUNJATA
Рет қаралды 15 МЛН
Тяжелые будни жены
00:46
К-Media
Рет қаралды 5 МЛН
Using a Stakeholder Analysis
3:54
Thoughts of an Experienced Case Team Coach
Рет қаралды 1
Exploiting Off By One Vulnerabilities
1:35:22
Off By One Security
Рет қаралды 1,6 М.
Introduction to Reverse Engineering and Debugging
2:03:51
Off By One Security
Рет қаралды 6 М.
Sean Baxter: Safe C++
1:28:00
Tristan Brindle
Рет қаралды 5 М.
HACKED!  How a Buffer Overflow Exploit works, plus Code Red!
25:50
Dave's Garage
Рет қаралды 189 М.
Introduction To GLIBC Heap Exploitation - Max Kamper
1:29:31
44CON Information Security Conference
Рет қаралды 15 М.
A Look at Modern Windows Kernel Exploitation/Hacking
2:34:37
Off By One Security
Рет қаралды 16 М.
Reverse Engineering Malware with Ghidra
1:13:43
Off By One Security
Рет қаралды 3,8 М.
how do hackers exploit buffers that are too small?
8:25
Low Level Learning
Рет қаралды 184 М.
Where to start with exploit development
13:59
David Bombal Clips
Рет қаралды 11 М.
Can they repeat the watermelon experiment?
0:36
Valja & Maxim Family
Рет қаралды 6 МЛН
路飞的心都被小女孩融化了#海贼王  #路飞
0:32
路飞与唐舞桐
Рет қаралды 17 МЛН
ХОРОШО ЧТО ПЕРЕПРОВЕРИЛ😂😂😂 #юмор #пранк
0:44
СЕМЬЯ СТАРОВОЙТОВЫХ 💖 Starovoitov.family
Рет қаралды 1,2 МЛН
Aramızda dağlar var 😂 #funny #viral #shorts
0:12
HASAN TARHAN SHORTS
Рет қаралды 6 МЛН
КАРМАНЧИК 2 СЕЗОН 6 СЕРИЯ
21:57
Inter Production
Рет қаралды 404 М.