Heap BINARY EXPLOITATION w/ Matt E!

  Рет қаралды 22,377

John Hammond

John Hammond

2 жыл бұрын

Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
📗Humble Bundle ➡ j-h.io/humblebundle
🐶Snyk ➡ j-h.io/snyk
🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ j-h.io/ctf
🎤 Speaking Requests ➡ j-h.io/speaking
💥 Malware Submission ➡ j-h.io/malware
❓ Everything Else ➡ j-h.io/etc

Пікірлер: 28
@user-ts8dq7yv4p
@user-ts8dq7yv4p 10 ай бұрын
Heres an analogy that helped me wrap my head around the concept of tcache.. So a construction worker rents a bunch of tools from a tool rental company. These tools come from the warehouse, which is down the street from the storefront. When the construction worker finishes with the tools, he brings them back to the store. Realizing that the tools are popular, the store worker puts the tools on a shelf in the store, instead of sending them back to the warehouse. That way they are easier to get for the next customer. The tools represent the blocks of memory, the tool rental company's warehouse represents the main memory, and the storefront represents the Tcache. When the tools (memory blocks) are returned (freed), instead of being sent back to the warehouse (main memory), they are kept at the storefront (Tcache) for faster access in future. So just like how it's more convenient and faster for the next construction worker (program or thread) to get the tools (memory blocks) from the storefront (Tcache) than from the warehouse (main memory), it's also more efficient for a program or thread to get memory blocks from the Tcache than from the main memory.
@Sam-wl7vn
@Sam-wl7vn 2 жыл бұрын
When you stop Matt to ask for Ghidra keybindings and explanations, that is super useful. Definitely doing the right thing there 🙂
@janosmarton7895
@janosmarton7895 2 жыл бұрын
More binary exploitation pls. Can you link Matt’s KZfaq pls 🙏🏻
@jackcruz4936
@jackcruz4936 2 жыл бұрын
15:20 Matt says: "it's very basic program" me: 🤯🤯
@DamianRyse
@DamianRyse 2 жыл бұрын
3 days ago, I tried to solve that exact challenge on Pico and I also never heared of tcache before. When didn't get any further on the binary and didn't know how to proceed, I thought "pretty sure John Hammond did that already, let's see if he has a video online about that". But I didn't find one and searched for other write-ups to help me solving and understanding tcache. And now you uploaded the vid that I would have needed a few days ago. :-D
@pomberorajy
@pomberorajy 2 жыл бұрын
I have been learning all the details of this challenge for the last 5 days, what a coincidence seeing this here!
@Bashir_Khan
@Bashir_Khan 3 ай бұрын
Thanks a lot dude! You really helped me out there
@kryptux2463
@kryptux2463 2 жыл бұрын
Love your work John. Keep it up.
@samthelamb0718
@samthelamb0718 4 ай бұрын
I can't stop coming back to this video, matt is so skilled and knowledgeable.
@tvathome562
@tvathome562 2 жыл бұрын
Wow I just worked through the binary exploitation deep dive matt, yesterday.. Looking forward to learning more....
@WhatTheWeb
@WhatTheWeb Жыл бұрын
I would love to see a demo of kit engine. Even for more experienced pwners browser stuff is quite daunting. Even going forward it would be nice if he could showcase more advanced techniques like kernel exploitation, browser, race conditions, etc. Great video!
@ernestoo8313
@ernestoo8313 2 жыл бұрын
Amazing content! Thanks very much!
@oussamaqazdar4787
@oussamaqazdar4787 2 жыл бұрын
More of this please ❤️
@cleightthejw2202
@cleightthejw2202 2 жыл бұрын
Hey the guy is talking about some deep stuff :) This is a whole different level of knowledge (which is worth learning which is worth the time to learn) :)
@applePrincess
@applePrincess 2 жыл бұрын
About patchelf, it overwrites a "cleaned" version by changing meta information stored in elf binary, so better keep original one just in case that broken??? path was the trick. And about Matt saying didn't run by applying patchelf, I bet env var messed up (I obviously didn't see the situation so don't quote me on this one 😆) again great video thank to both of you.
@Bashir_Khan
@Bashir_Khan 3 ай бұрын
Can you please provide the link to the video you're referring to when you said at 17:55 about how you set up the pawninit command.
@emdwyer7331
@emdwyer7331 2 жыл бұрын
Aaand I'm lost very quickly. Lol. Need to backtrack my learning and start from the beginning
@chainsawmanfan3002
@chainsawmanfan3002 Жыл бұрын
I'm really new to this field, may I know what pwninit does????
@claymoody
@claymoody 2 жыл бұрын
Go Tigers!!
@guilherme5094
@guilherme5094 2 жыл бұрын
👍
@chainsawmanfan3002
@chainsawmanfan3002 Жыл бұрын
This is a 'Basic' challenge.
@KFLawless1412
@KFLawless1412 Жыл бұрын
Can we crowdfund a new microphone for Matt?
@anwarulbashirshuaib5673
@anwarulbashirshuaib5673 Жыл бұрын
can anyone help me with the part at 10:12? I did not understand why he changed it to char[3]
@anwarulbashirshuaib5673
@anwarulbashirshuaib5673 Жыл бұрын
nevermind, he explained it later
@ahmedahmedx9600
@ahmedahmedx9600 Жыл бұрын
You are not bug hunter and you have hackerone t-shirt 😂
@bhagyalakshmi1053
@bhagyalakshmi1053 10 ай бұрын
Linux what
@bhagyalakshmi1053
@bhagyalakshmi1053 10 ай бұрын
Zoom
@laurenlewis4189
@laurenlewis4189 2 жыл бұрын
I searched M. Alpha and got a friggin Sigma grindset "life coach". Does Matt have any social media?
Binary Exploitation Deep Dive: Return to LIBC (with Matt)
2:12:41
John Hammond
Рет қаралды 184 М.
когда одна дома // EVA mash
00:51
EVA mash
Рет қаралды 11 МЛН
Kitten has a slime in her diaper?! 🙀 #cat #kitten #cute
00:28
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 174 М.
Joining a HOME LAB Domain (Active Directory #01)
51:39
John Hammond
Рет қаралды 64 М.
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 192 М.
A Vulnerability to Hack The World - CVE-2023-4863
18:00
LiveOverflow
Рет қаралды 103 М.
Yet Another Cybercrime Hacking Forum...
22:10
John Hammond
Рет қаралды 35 М.
What Everyone Missed About The Linux Hack
20:24
Theo - t3․gg
Рет қаралды 273 М.
Diffie-Helman Key Exchange (PicoCTF 2022 #32 'diffie-helman')
30:25
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1 МЛН