Python Pwntools Hacking: ret2libc GOT & PLT

  Рет қаралды 45,807

John Hammond

John Hammond

Жыл бұрын

j-h.io/snyk || Snyk loves CTF challenges just like this for binary exploitation and web security -- you can use Snyk to find vulnerabilities in your own applications FOR FREE ➡ j-h.io/snyk
The challenge repository: github.com/JohnHammond/misfor...
The Binary Exploitation Breakdown video with Matt: • Binary Exploitation De...
🔥 KZfaq ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 56
@randombar
@randombar Жыл бұрын
You are on a roll with uploads. I love your content.
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
Yeee.
@Smoth48
@Smoth48 Жыл бұрын
Having just watched the longer video with you and Matt as a primer to this, this video is excellent and a wonderful distillation of the key information in that video. Very very cool, and very informative! Well done and thank you :)
@melonscratcher
@melonscratcher Жыл бұрын
A pleasure to watch your content Bro, keep doing your thing man 🎉
@msh6610
@msh6610 Жыл бұрын
Some leet haxing there 👍😍Thankfully stack-overflow attacks are hard to pull off 😨
@ava_l4nch264
@ava_l4nch264 5 ай бұрын
hello John tysm for this amazing video, I am a ctf player how is still trying to decide which category to focus on, and this video inspired me to look more at PWN. again tysm
@GenesisSnipingClan
@GenesisSnipingClan Жыл бұрын
Dang bro you've got 500k subs now? I remember when you only had 10k
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
First 🥇🏆 to reply here. Hehe. Yeah, he's one of the biggest ethical hackers on KZfaq now. Hehe
@JacobWK
@JacobWK Жыл бұрын
With you on that. John's one of the first people who got me really into this stuff. Now I'm over here in the field living it
@ImJykai
@ImJykai Жыл бұрын
@@JacobWK yeah man i tried but ultimately, hacking aint for me. Id rather sell you a life insurance policy then go home and crack a beer lol
@JacobWK
@JacobWK Жыл бұрын
@ImJykai can't die with life insurance 🤷‍♂️ valid point get me in on that insider life extender policy which gets me the added guaranteed 25 years of healthy living please
@SpadesWoW
@SpadesWoW Жыл бұрын
Time flies man - feel you
@hackwithprogramming7849
@hackwithprogramming7849 Жыл бұрын
Was waiting for this content thanks John lots of love from Goa 🔥❤️❤️❤️❤️❤️❤️
@KCM25NJL
@KCM25NJL 7 ай бұрын
I like the technique a lot.... props to the folks who made pwntools, it's something else. Now, please pretty please.... can you run one of these using a modern binary that is not thrown together with obvious buffer overflows that one might have to work a little harder to get anywhere with? I totally appreciate this is sorta beginner level binary exploitation, but I do wonder if there is an intermediate -> expert level set of techniques that every day red teamers use on the bleeding edge of ethical hacking
@rahuldg9218
@rahuldg9218 Жыл бұрын
Nice one john ❤️❤️❤️
@bigdaddy5303
@bigdaddy5303 Жыл бұрын
The hair is a flowing sea of beauty
@polychrus
@polychrus Жыл бұрын
Hey John, I'm a biologist from Brazil who likes very much programming in general and security. I learn a lot with you! I was uncertain if it'd be good to say what I'm gonna say, but though you might find it interesting (you are totally free to delete the comment if you want, I'm not gonna bother with that!) and might find it cool to learn something new (as I always find, learning with your videos hehehe) and with no practical utility for you (totally nerdy thing to know). So: In the thumb, the snake you put there is not a python, actually it is another type of snake, a viper. I can tell it by some characteristics, such as its fangs. Viper have these big rear fangs, used to inject venom. Python snakes have no big hear fangs and also no venom. The prey is killed by constriction instead of venom. Again: just saying, I'm not by any means criticizing your work or meaning you "should've known this".
@dantech_guru
@dantech_guru Жыл бұрын
Best channel ever
@Linux333
@Linux333 Жыл бұрын
Nice DEFCON t-shirt!
@_SanjayBiswas
@_SanjayBiswas Жыл бұрын
You are super talented. 🙏
@zeshanahmednabin
@zeshanahmednabin 7 ай бұрын
The exploit worked locally for me. But when I did the remote. It doesn't work. Dk why maybe some stack alignment issue. My local Ubuntu is 23.04.
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
🔥🔥🔥
@arjunraghunadhan3611
@arjunraghunadhan3611 Жыл бұрын
Sir I am your big fan and i feel motivated after seeing your video I have a issue can you tell me roadmap to become in hacking level
@maxmusterspace6037
@maxmusterspace6037 Жыл бұрын
I tried to compile the binary locally without using the docker stuff. But then I don't have the pop instructions in my binary. Why is that?
@prescientdove
@prescientdove Жыл бұрын
finally, thanks dude. i feel seen.
@hamstek6334
@hamstek6334 Жыл бұрын
Well done.
@user-nf7wp5wt4q
@user-nf7wp5wt4q 4 ай бұрын
8:05 memo~
@WyldeZk
@WyldeZk Жыл бұрын
This video is gold
@nadirstivan6088
@nadirstivan6088 Жыл бұрын
Hello, what is the first video in which you explain how to learn reverse engineering. I mean how to learn reverse engineering from scratch
@M4rc311o
@M4rc311o Жыл бұрын
I could be wrong but I think that there were no stack alignment issues at the start. The reason that you need to add one ret instruction was, that you were overwriting RBP which is base pointer, but return address is just after base pointer on stack so you need to add 8 more bytes to control RIP. But great video❤
@RJZN5Gaming
@RJZN5Gaming 10 ай бұрын
Can you help me learn Python like in this video? Please give me some keywords. What is so different about CTF coding and common coding?
@guilherme5094
@guilherme5094 Жыл бұрын
Really nice👍!
@CrazedMachine
@CrazedMachine 11 ай бұрын
Damn that is cool to watch.
@JontheRippa
@JontheRippa Жыл бұрын
❤👍 thank you
@zoes17
@zoes17 Жыл бұрын
Snyk needs support for Rust... Er maybe they wait until the trademark RFC is decided since that might affect them if they were to try and develop something for it.
@whathedogdoin
@whathedogdoin Жыл бұрын
cool
@fairyroot1653
@fairyroot1653 Жыл бұрын
The most beautiful 44 minutes of my life
@forheuristiclifeksh7836
@forheuristiclifeksh7836 Ай бұрын
3:56
@forheuristiclifeksh7836
@forheuristiclifeksh7836 Ай бұрын
0:59
@bhagyalakshmi1053
@bhagyalakshmi1053 9 ай бұрын
Character watch scatter baheru letters was alf 'a,z' character
@equious8413
@equious8413 Жыл бұрын
I've been coding for years, have completed projects in 4 languages, run a web3 coding discord with hundreds of members, and still this is all absolutely nonsense to me lol Shit's wild.
@bhagyalakshmi1053
@bhagyalakshmi1053 9 ай бұрын
Rsp what
@ruthvikas
@ruthvikas Жыл бұрын
Day 3 of requesting to make videos on picoCTF 2023. Please.
@_JohnHammond
@_JohnHammond Жыл бұрын
It's been on my list, I'll see how many I can put together!
@ruthvikas
@ruthvikas Жыл бұрын
@@_JohnHammond oh thank you 😁
@LostInTheRush
@LostInTheRush Жыл бұрын
Hey John. I really like your content, so don't take this the wrong way. I've been wondering why I regularly have trouble focusing throughout your videos, and I think I've come to the conclusion that it's because you speak very "loudly" (not in amplitude obviously, but in articulation), which when listening for longer periods of time, can become quite mentally tiring. A bit like being yelled at for 44 minutes. Not sure if it's just my neurodivergent ass, but I thought I'd mention it. I mean, I assume you compress the audio as well to increase loudness, and if people need it louder, they can just increase the volume. I am 100% sure people will still find your videos interesting and engaging with a little less power on the speak. Keep up the great work though!
@bhagyalakshmi1053
@bhagyalakshmi1053 9 ай бұрын
Cmp
@mrirfan__07
@mrirfan__07 21 күн бұрын
22:5
@mrirfan__07
@mrirfan__07 21 күн бұрын
5:11
@akuuzii4077
@akuuzii4077 Жыл бұрын
first
@nadirstivan6088
@nadirstivan6088 Жыл бұрын
I'm talking about apps
@craxxysum1264
@craxxysum1264 Жыл бұрын
The snake on the thumbnail is not a python, bro, its not even a boa...see the fangs that's a viper...
@vadim0ne930
@vadim0ne930 Жыл бұрын
You're my hero
@bhagyalakshmi1053
@bhagyalakshmi1053 9 ай бұрын
R11,all numbers 🔢 list explain
@forheuristiclifeksh7836
@forheuristiclifeksh7836 Ай бұрын
4:12
Finding WEIRD Typosquatting Websites
24:26
John Hammond
Рет қаралды 232 М.
Heap BINARY EXPLOITATION w/ Matt E!
1:10:24
John Hammond
Рет қаралды 22 М.
SMART GADGET FOR COOL PARENTS ☔️
00:30
123 GO! HOUSE
Рет қаралды 21 МЛН
[실시간] 전철에서 찍힌 기생생물 감염 장면 | 기생수: 더 그레이
00:15
Netflix Korea 넷플릭스 코리아
Рет қаралды 38 МЛН
Mac & Cheese Donut @patrickzeinali @ChefRush
00:53
albert_cancook
Рет қаралды 232 МЛН
Điều cuối cùng mẹ có thể làm cho con || Sad Story  #shorts
01:00
CSAW'19 - PWN - Ret2libc w/ PWNTOOLS (baby_boi)
24:03
John Hammond
Рет қаралды 25 М.
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 137 М.
PowerShell CRYPTOSTEALER through DNS
24:28
John Hammond
Рет қаралды 54 М.
Convert GUI App to Real Program -  Python to exe to setup wizard
23:27
Python Simplified
Рет қаралды 446 М.
ROP is DEAD! Kernel Driver Binary Exploitation
16:04
John Hammond
Рет қаралды 20 М.
Scraping Dark Web Sites with Python
19:29
John Hammond
Рет қаралды 112 М.
everything is open source if you can reverse engineer (try it RIGHT NOW!)
13:56
Low Level Learning
Рет қаралды 1,2 МЛН
Programming ▫️ Designing ▫️ Coding ▫️ Music 📈
2:51:59
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
21:47
John Hammond
Рет қаралды 149 М.
SMART GADGET FOR COOL PARENTS ☔️
00:30
123 GO! HOUSE
Рет қаралды 21 МЛН