How some functions can be Dangerous | bin 0x01

  Рет қаралды 140,685

PwnFunction

PwnFunction

3 жыл бұрын

#BinaryExploitation #ELF #Executables
This is the second video in the series Binary Exploitation. In this video, we're gonna look at some simple attacks via dangerous functions.
🔗 Code + Build Instructions: old.hackercamp.co/
💬 Discord: / discord
🐤 Twitter: / pwnfunction
🎵 Track: Warriyo - Mortals (feat. Laura Brehm)
NCS link: • Warriyo - Mortals (fea...

Пікірлер: 194
@PwnFunction
@PwnFunction 3 жыл бұрын
I had to do it. P.S did you find the date?
@a.yashwanth
@a.yashwanth 3 жыл бұрын
glad you did.
@brunoais
@brunoais 3 жыл бұрын
ofc
@SEX_ON_DRUGS
@SEX_ON_DRUGS 3 жыл бұрын
😎 nice
@paramjotsingh8406
@paramjotsingh8406 3 жыл бұрын
I feel like "I have been pwned"
@chompyumyum4615
@chompyumyum4615 3 жыл бұрын
The game. Sorry I had to get revenge.
@sovietcat4825
@sovietcat4825 3 жыл бұрын
I love your color scheme and art style... even your terminal feels satisfying to look at
@Wpar
@Wpar 3 жыл бұрын
do you know what the font is called for the terminal?
@sovietcat4825
@sovietcat4825 3 жыл бұрын
@@Wpar yes it's monolisa... I worked hard to find it but its not free tho
@carlostypes3942
@carlostypes3942 3 жыл бұрын
I believe it is the Robby Russell theme from Oh My ZSH if anyone else is looking for this in the future, if not it looks very similar
@SpeedingFlare
@SpeedingFlare 3 жыл бұрын
The theme of his videos reminds me of the Dracula theme
@Wpar
@Wpar 3 жыл бұрын
@@sovietcat4825 50 quid for a font lmao
@oleh6738
@oleh6738 3 жыл бұрын
In level 2 you could also enter 'zsh' instead of '\
@paulosantana9607
@paulosantana9607 3 жыл бұрын
I was thinking the same, but wasn't sure if it would work
@enderger5308
@enderger5308 3 жыл бұрын
Or sh, which is 2 characters (launching the Borne Shell)
@masamune5710
@masamune5710 3 жыл бұрын
That’s what I immediately thought. In ctfs it’s generally desirable to look for ways to get a shell
@Ski4974
@Ski4974 3 жыл бұрын
I thought that tool lol
@lilspelunker5613
@lilspelunker5613 3 жыл бұрын
I was thinking of " -i" since the manual page had -i (interactive mode) and I thought it'd use interactive and ignore -c if you did that
@itskarudo
@itskarudo 3 жыл бұрын
did i just get rickrolled by an ELF binary
@Sparkette
@Sparkette 3 жыл бұрын
If you run your browser on Linux, technically that's any rickroll.
@tsalVlog
@tsalVlog 3 жыл бұрын
@@Sparkette *on Linux kernel versions after 2.6.0,
@Sparkette
@Sparkette 3 жыл бұрын
@@tsalVlog What did that add? DRM? (The good kind 😛)
@Ryan-xq3kl
@Ryan-xq3kl 3 жыл бұрын
@@Sparkette one time i got an error that said “invalid arch independent ELF magic” and i thought it was just fucking with me
@Sparkette
@Sparkette 3 жыл бұрын
@@Ryan-xq3kl If that happens again, I'd call Santa Claus
@parente1998
@parente1998 3 жыл бұрын
came here from LiveOverFlow's video and i loved your content, just what I was looking for
@sk8erman069
@sk8erman069 3 жыл бұрын
Just about died when you made the ‘root shell on the first date’ joke. Great stuff, can’t wait for the next video!
@0xsudip892
@0xsudip892 3 жыл бұрын
I really like your way of teaching.Cool+informative+meme😂❤️
@tudhaya
@tudhaya 3 жыл бұрын
that was some next-level rickroll... it's a great video btw!
@fisch37
@fisch37 2 жыл бұрын
@Hand Grabbing Fruits Well, it's a level 3 rickroll
@bluesillybeard
@bluesillybeard 3 жыл бұрын
14:20 as soon as I saw "never gonna give" I instantly thought "OH NO"
@CubensisEnjoyer
@CubensisEnjoyer 3 жыл бұрын
Wow this has to be one of the most interactive videos I've ever watched about this topic. I know a little bit about Linux and a decent amount about C++ and this helped me connect the two in such a sensible way.
@wizdakid1842
@wizdakid1842 3 жыл бұрын
im really glad i found you i love how you setup you videos, you give examples and really break it down, keep up the good work
@gaspardbouchard6215
@gaspardbouchard6215 3 жыл бұрын
I have been looking for something like this for the past 3 years, and I love this
@ilyboc
@ilyboc 3 жыл бұрын
I like how clean your slides/interface are
@samuelisaac2984
@samuelisaac2984 3 жыл бұрын
The use of þ in this video is sort of hilarious to anyone that reads it as "th"
@navidmafi
@navidmafi 2 жыл бұрын
This is pure gold, keep up the great work.
@JasonLee-kw9ow
@JasonLee-kw9ow 3 жыл бұрын
Bro, your videos are so amazing. thank you for the hard work. Have a nice day!
@PwnFunction
@PwnFunction 3 жыл бұрын
You too.
@altairbueno5637
@altairbueno5637 3 жыл бұрын
This channel is so good, loving your content
@PwnFunction
@PwnFunction 3 жыл бұрын
Glad you like it.
@mohammedjawahri5726
@mohammedjawahri5726 3 жыл бұрын
this is so high quality, amazing work
@okal7706
@okal7706 3 жыл бұрын
As always, excellent video.
@borisg6384
@borisg6384 2 жыл бұрын
The roll at the end was a nice touch 👌
@funkykong9001
@funkykong9001 3 жыл бұрын
Love the graphics. Very well done
@sechvnnull1524
@sechvnnull1524 3 жыл бұрын
Awesome job explaining this!!
@Kaniggel_
@Kaniggel_ 2 жыл бұрын
Very nice video! Glad I found your channel :P
@3dnacho
@3dnacho 3 жыл бұрын
Really good content!
@pbezunartea
@pbezunartea Жыл бұрын
Great video!
@isiraadithya
@isiraadithya 3 жыл бұрын
Wow! No unlikes so far!!! I never seen a video like this. congrats! Keep it up. I am going to watch the whole channel today. 👌🏽👌🏽👌🏽
@RudraSingh-pb5ls
@RudraSingh-pb5ls 3 жыл бұрын
Gals you are back with another video 😁😁 Keep making such videos
@rayhaanbhikha9094
@rayhaanbhikha9094 3 жыл бұрын
Amazing content 👏
@MohammadRuhaanSofi
@MohammadRuhaanSofi 3 жыл бұрын
That's where the trouble began, that terminal. That damn terminal 🥺 It's so beautiful 😭
@brodysteinbeck358
@brodysteinbeck358 2 жыл бұрын
This helped a lot thank you
@columbasaint465
@columbasaint465 3 жыл бұрын
Excellent content
@NinjaTech1337
@NinjaTech1337 3 жыл бұрын
Awesome mate❤️we need more videos for binary exploitation
@flamingo-stabbingo
@flamingo-stabbingo 3 жыл бұрын
Your materials are soooo go, thank you, would love to have lessons with you :)
@ignaciomuriel5183
@ignaciomuriel5183 3 жыл бұрын
Nice very good ; thanks for sharing
@d0ubtingThom4s
@d0ubtingThom4s 2 жыл бұрын
just use shell script for example 3 to save some steps! Anyway thanks for the awesome video!! I was actually surprised that after years of programming and no studying security a lot of these answers came quickly and naturally to me. I would have even tested
@caiohenrique5587
@caiohenrique5587 3 жыл бұрын
Nice video! What program do you use to make those kind of animation ?
@sykocode8530
@sykocode8530 3 жыл бұрын
OMG! I fkin died when you said "only logical thing to do next: hack the Pentagon". 🤣🤣🤣 Your sense of humor is awesome!
@hectorcanizales5900
@hectorcanizales5900 3 жыл бұрын
Great video man, subbed! Got any suggestions on how to get started on learning how to hack?
@Hassnain__622
@Hassnain__622 3 жыл бұрын
I was waiting for binary exploitation for so long
3 жыл бұрын
I love your style and the pace of the video, subscribed! Btw what font do you use? It's lovely!
@__cdecl4085
@__cdecl4085 3 жыл бұрын
It's called Dank Mono
@Tony_Goat
@Tony_Goat 3 жыл бұрын
>Imagine what could go wrong if a user supplied input got in, it would be worse than if an asteroid hit I dunno man, sounds like bash but with extra steps.
@ethanrushbrook3314
@ethanrushbrook3314 3 жыл бұрын
+1 sub :) KZfaq served me some of these vids and the production quality is 9/10 and you've only got like 60k subs. To the moon like doge...
@00xero
@00xero Жыл бұрын
"Hi simp" 😂 nice touch
@jadigger8695
@jadigger8695 3 жыл бұрын
niceeeeee videeeo keeep going please
@deemystry
@deemystry 3 жыл бұрын
Security cells in your brains' like *beep* *beep* *beep* WARNING! Threat detected, Defcon1 bla bla bla XD [ This guy is simply awesome! ] Love your content
@callumery119
@callumery119 3 жыл бұрын
It must take you so long to make these incredibly videos.
@smellthel
@smellthel 3 жыл бұрын
How to hack pentagon: 1. get an axe 2. go to pentagon
@skilz8098
@skilz8098 2 жыл бұрын
Vote after dying, it seems to work as of lately...
@Omar-sr1ln
@Omar-sr1ln 3 жыл бұрын
subbed
@umbra.2942
@umbra.2942 Жыл бұрын
almost died to the rickroll, it's currently 11pm, i'm alone in the dark.
@babakjan
@babakjan 3 жыл бұрын
Great video. Can you please make video, where you show, how to customize shell like you 🙏😁.
@cybersecurity3523
@cybersecurity3523 3 жыл бұрын
Good bro
@ladyViviaen
@ladyViviaen 3 жыл бұрын
respects for using chr(0x69) to test inputs hehehe
@NithinJune
@NithinJune 3 жыл бұрын
What is your zsh profile (basically how do I get my shell to look like yours) also for vscode what fonts do you use
@Tclack
@Tclack 3 жыл бұрын
I wish to see much success with this channel. You're setting yourself up nicely! subscribers+=1
@blank-vw2sb
@blank-vw2sb 3 жыл бұрын
error: expected ';' before EOF subscribers += 1 ^~~~~~
@Tclack
@Tclack 3 жыл бұрын
Haha, very nice. But you see, I'm using python
@Tclack
@Tclack 3 жыл бұрын
@juan francisco Minor you're totally right. My last excuse is I just don't really know C/C++ 😥
@lobsterfork
@lobsterfork 2 жыл бұрын
@@Tclack well, once you know C++, you know C!
@0xcyberzombiexdev448
@0xcyberzombiexdev448 3 жыл бұрын
Where you edit your's video and how did you do your animations.
@tomer2565
@tomer2565 3 жыл бұрын
Easier solution to *level3* that I've come up with: - create a C file(mw.c) that executes the command "cat flag.txt" - compile the C in a way that the binary executable name is only 2 chars long. gcc mw.c -o *mw* - replace the "date" text in the level3.c file by using the sed command, hence: *sed -i 's@date@./mw@' level3* - ./level3 and boom
@JoPraveen
@JoPraveen 3 жыл бұрын
Hey bro can you tell me which software you're using to edit these animations?
@rashie
@rashie 2 жыл бұрын
👍👍
@bandanaboii3136
@bandanaboii3136 3 жыл бұрын
Just said out loud “who the fuck is this???” Subscribed
@zacwesleybrown
@zacwesleybrown 3 жыл бұрын
For level 2 couldnt you also enter -i as then zsh would spawn a interactive shell
@scottdotjazzman
@scottdotjazzman 3 жыл бұрын
You cheeky bastard! 😂
@alphatau87
@alphatau87 3 жыл бұрын
Please continue making moar videos. Format, content and humor are great to my taste!
@0x13v
@0x13v 3 жыл бұрын
hello, can you explain web object injection attack ?
@willd4686
@willd4686 3 жыл бұрын
Haha I've used system()! Super useful. I've also done something similar with JavaScript. But sometimes you want to do something that isn't technically safe.
@mospher9253
@mospher9253 3 жыл бұрын
UHHH New Video
@boblol1465
@boblol1465 3 жыл бұрын
13:10 big brain
@killianoshaughnessy1174
@killianoshaughnessy1174 3 жыл бұрын
I can't believe I got rick rolled.
@Livenewme
@Livenewme 2 жыл бұрын
Instructions unclear I'm now on the FBI's most wanted list
@blank-vw2sb
@blank-vw2sb 3 жыл бұрын
9:35 Gnat!!
@ca7986
@ca7986 3 жыл бұрын
❤️
@cvcvka588
@cvcvka588 3 жыл бұрын
What's the drawing app that you're using?
@TechflashYT
@TechflashYT Жыл бұрын
Just about died when the last flag was read.
@winstonlopez6117
@winstonlopez6117 3 жыл бұрын
I green to the whole writing code. Learing linux on a pie someone gave me. So to be able to have root access in a line is crazy to me. Havin Fun learning though.
@leftleg4024
@leftleg4024 2 жыл бұрын
Is there permission control on setting PATH?
@crlfff
@crlfff 3 жыл бұрын
better than liveoverflow
@electricz3045
@electricz3045 3 жыл бұрын
If you have this guy you don't need other tutorials / explanations from others ♥️
@Maximxls
@Maximxls 3 жыл бұрын
this was a very interesting rickroll
@mmdts
@mmdts 2 жыл бұрын
In level 2, why does typing "zsh" for my 3 characters not open me a shell where I can type longer commands? If I try "zsh -c zsh" in my terminal it does what I expect it to do. Is the difference due to the way the "system" function works, or is it due to the way ncat works?
@shlomiruder4722
@shlomiruder4722 3 жыл бұрын
what about short symbolling link?
@obitorasu1760
@obitorasu1760 3 жыл бұрын
The only time my alarm bells start ringing is when I find people got rick rolled in the comments before I finish the video.
@damilolarandolph8523
@damilolarandolph8523 3 жыл бұрын
First time I've heard etc pronounced as etsy
@matthewrease2376
@matthewrease2376 2 жыл бұрын
My zsh doesn't let me change directories with that shorthand...
@harshad3767
@harshad3767 3 жыл бұрын
Can someone tell me what type of animation he uses
@codebeta_cr
@codebeta_cr 3 жыл бұрын
Anyone know what font the terminal is using?
@PwnFunction
@PwnFunction 3 жыл бұрын
Dank Mono
@claugodcli
@claugodcli 3 жыл бұрын
On 5:17 I see a daywalker indeed
@ananay22
@ananay22 3 жыл бұрын
Why don't you run zsh as a command inside the zsh -c ? That'd open another zsh shell for you right?
@ngocphathung4463
@ngocphathung4463 3 жыл бұрын
I think you should increase the volume of the upcoming videos, because it's still difficult to listen to you even though I've already maxed out the volume of my phone.
@IamItsNolan
@IamItsNolan 2 жыл бұрын
PWN how do you make your thumbnails
@PwnFunction
@PwnFunction 2 жыл бұрын
I draw in Adobe animate
@xaxaxa764
@xaxaxa764 3 жыл бұрын
we got ourshellves
@alejandroalzatesanchez
@alejandroalzatesanchez 3 жыл бұрын
Get DamnPWNed
@MatildaHinanawi
@MatildaHinanawi 2 жыл бұрын
So anything running on elevated permissions mustn't use the PATH variable...
@classsix6491
@classsix6491 Жыл бұрын
I actualy got them all first try(i knew how the system worked from windows)
@nickrax4806
@nickrax4806 3 жыл бұрын
Did I miss something or why exactly is the process of level 2 run as root?
@Gramini
@Gramini 3 жыл бұрын
Simulated human mistake maybe.
@MatthiasLee1
@MatthiasLee1 2 жыл бұрын
for #2, I would have run `sh` so that I can access a shell as root and run my cat command in there
@sudhanshurajbhar9635
@sudhanshurajbhar9635 3 жыл бұрын
Did you really revealed your face in the latest noobOverflow video?
@PwnFunction
@PwnFunction 3 жыл бұрын
Ah hell nah, that was Lupin. I'll remain faceless.
@abdelmajidalahyane3492
@abdelmajidalahyane3492 3 жыл бұрын
Can u make a theme for Ubuntu with your color scheme pls ?
@ammaarshamail
@ammaarshamail 3 жыл бұрын
How did you get dark mode on Google search ?
@obitorasu1760
@obitorasu1760 3 жыл бұрын
probably using dark reader extension?
@Duconi
@Duconi 3 жыл бұрын
Thanks for the detailed explanation but I didn't get, how the executed commands get root access in the first place. You are starting for example level1 as a normal user. As the program is run as user it should not have access to that file. But why does it has access? If programs have access in general you could execute cat directly on the file and it would have access. But that's not the case, right? So is it because of the chmod u+s? So why don't you do chmod u+s on cat and directly read the file with cat instead of misusing another program? It's because you need root rights to set that flag right? But if you have root rights, to set that flag, why don't you use the same root rights to cat on the file? Actually the programs you wrote would be save if you didn't have put chmod u+s on them, right? So not the software is insecure the flag is. Shouldn't you tell people not to use chmod u+s then?
@byronwatkins2565
@byronwatkins2565 3 жыл бұрын
A BIT can take only two values: 0 or 1. So how can the execution privilege "bit" be -, x, or s?
@xanri7673
@xanri7673 3 жыл бұрын
s stands for suid which is a separate permission. It's just that it doesn't make sense for a file to be setuid but not executable.
@nourway3639
@nourway3639 3 жыл бұрын
what is the font you are using ?
@PwnFunction
@PwnFunction 3 жыл бұрын
Dank Mono
Why you should Close Your Files | bin 0x02
8:11
PwnFunction
Рет қаралды 319 М.
one wrong npm package
19:27
PwnFunction
Рет қаралды 182 М.
I CAN’T BELIEVE I LOST 😱
00:46
Topper Guild
Рет қаралды 57 МЛН
БОЛЬШОЙ ПЕТУШОК #shorts
00:21
Паша Осадчий
Рет қаралды 2,8 МЛН
⬅️🤔➡️
00:31
Celine Dept
Рет қаралды 50 МЛН
What are Executables? | bin 0x00
8:35
PwnFunction
Рет қаралды 184 М.
Dangerous Code Hidden in Plain Sight for 12 years
18:00
PwnFunction
Рет қаралды 1,6 МЛН
I Made A Water Computer And It Actually Works
16:30
Steve Mould
Рет қаралды 7 МЛН
~/.dotfiles in 100 Seconds
13:54
Fireship
Рет қаралды 407 М.
Solving a Hard Google CTF challenge - "Paste-tastic!"
26:26
PwnFunction
Рет қаралды 93 М.
How To Predict Random Numbers Generated By A Computer
13:54
PwnFunction
Рет қаралды 534 М.
Open Redirect Vulnerability Explained
8:34
PwnFunction
Рет қаралды 161 М.
I Hacked Into My Own Car
20:29
Steve Mould
Рет қаралды 2,7 МЛН
I CAN’T BELIEVE I LOST 😱
00:46
Topper Guild
Рет қаралды 57 МЛН