Great explanation, I learned a lot from this video.
@user-xw1nm7pz7d23 сағат бұрын
masterpiece
@BlahBlah-kb1wfКүн бұрын
You kinda went overboard when you started talking about VPNs and sockets and whatever else. At least overboard for me. A newb.
@monicadanesi4508Күн бұрын
1:28 I am at a loss I need help. I have nothing left. It's been 3 years, are there any resources that could help me? I can't even get a job. It's a living nightmare. Complete access and total control of my tech.
@nBlackyHVH3 күн бұрын
We need this series back
@dark_red_blood3 күн бұрын
thanks.
@GamingBoy-to7zb4 күн бұрын
Bro actually showed us how to get ForceOP without even saying 😂
@ricp4 күн бұрын
16:36 great perspective on attempting it regardless!
@ricp4 күн бұрын
This is so great! I love the level of detail you go into, thanks a lot!
@ricp4 күн бұрын
great explainer!
@SnakeSagacity4 күн бұрын
How long do steam support usually reply? I got fished and the link automatically changing email address in a blink of an eye.
@foxythefunpirate_yt27384 күн бұрын
can you make a tutorial :)
@jacobsurles75556 күн бұрын
I badly needed this. Thank you!
@bunsogamingV.116 күн бұрын
WOW..TRUE❤❤
@TheGrimPhreaker7 күн бұрын
Thank you for explaining this! I was thinking of trying CTF just for fun and now I at least know what to expect😊
@chriskaprys9 күн бұрын
Man I wish I understood what actually takes place here, between the stack and the c code. I understood all the videos in this playlist thus far, pausing and reviewing and trying things in my terminal until it made sense. But this one felt like a giant leap and now I'm standing across a chasm and can't find the bridge to the other side, lol. I've watched it over a dozen times, pausing and staring at the code and terminal and listening to the explanation .. still baffled. I get that printf '%x' or '%d' without an argument is leaking memory off the stack. I get what '%n' is doing, printing the number of previously entered chars into a variable, e.g.: > printf 'abc%n' x; echo $x > abc3 What I don't understand is 1) How including the address of the 'target' variable in the payload string affects the value stored in 'target' at that address. -Why would this be treated any differently than some other arbitrary string, e.g. '41414141'? Because you're not actually executing an instruction on 0x8049638 in memory/code, you're simply leaking from the stack the string that you've written, between 'AAAA' and 'BBBB', right? So how is the value at that address affected? 2) How "if(target)" is evaluating to true. -Does 'target' start out as 0 / NUL, and then evaluate to true once it's non-zero? -If so, is 'target' somehow becoming the variable that %n is writing to (like the 'x' above)? (Given the vocabulary used in the video, I'm guessing that's probably the case, but I just don't see it happening.) -If so, (for the sake of understanding the flow of information) what non-zero number is being written to 'target' on success? '4' (AAAA) or '7' (8049638)?
@dancorvalan32059 күн бұрын
Great job man! These challenges r no joke.
@davidyang151912 күн бұрын
Is there a github link for this?
@Dominik-K12 күн бұрын
Love serenity
@KRIGBERT12 күн бұрын
I find that I'm best at teaching the things I've struggled with myself -- apparently this isn't just true for me. Great video :)
@xfrazle14 күн бұрын
i played this on my win 98 pc lol
@mubarakharuna642515 күн бұрын
I have changed my mind from going we web application, let me capitalize on mobile App
@Adam_48315 күн бұрын
AWESOME! Very clear!
@newstonight12316 күн бұрын
"uncrackable" and what if you just remove the if/else statement lmao?
@FelipeGuimaraes4517 күн бұрын
I always come back to watch this video, this is cinema
@user-ti1mu8ki9w18 күн бұрын
tell me how
@samucancld18 күн бұрын
Fascinating content, thanks!
@PercivalBrianalt118 күн бұрын
useless bruh fully different topic
@user-ws7wh8kz8h18 күн бұрын
Great Job. I'm new to all this, and you made it easy for me to understand.
@ImadSaci-xc4rm19 күн бұрын
I love you bro,i follow since along time,but am not pregressing 😂
@derelictmanchester874519 күн бұрын
Love the intro music snippet... where's is sampled from..?
@LordMarlle19 күн бұрын
The old man glitch was incredibly strange and interesting to me as a child. I knew about game genie and understood that it changed the data of the game, so that wasn't mysterious or strange at all, it only got a bit fascinating when random codes sometimes would do unexpected things to the game. But talking to the old man, rewatching his tutorial, flying to some arbitrary yet specific locale, and then surfing, but only on the ledge, and then weird encounters would start, and somehow a single item slot would get multiplied? That was so frikkin weird. I'm not an expert of processors or programming at all, but I have a certain interest and I think it stems from that very glitch
@grain-bi8iu21 күн бұрын
"a lot of the games arent played anymore" man i played that map on warcraft 3 nooo use that example
@Celvin100022 күн бұрын
Great Video !
@f4zer_22 күн бұрын
very acceptable, thank you for this video, you keep saying that there's no clear path, though I figured it out right as you give m0re and more examples. "if you cannot see the path, your destination is far away"- best quote by you, and this helps in many other aspects of life. this was the best video I've watched and gained a clear perspective on ethical hacking..!! keep creating awesome content loved your work on this video!!!
@james-wihz22 күн бұрын
🤣🤣🤣🤣🤣🤣🤣🤣 coool
@v_gg622 күн бұрын
Whytf yt didn't recommend this video before 6 years ago why now
@ariadesupriyatna22 күн бұрын
😅
@smellslikemaurice23 күн бұрын
I came here after watching the Leeroy Hacker Exposed video and damn. This is awesome. I love Minecraft and I'm learning python rn. It's unbelievable how much I already understand due to your great explanations.
@makezi723 күн бұрын
Thank you for sharing this informative content. It's interesting to note how the previous Systems Administrator at my workplace was strongly in favor of implementing HTTP Strict Transport Security (HSTS) and advocated for team members to obtain Security+ certification. Unfortunately, his misconfigured setup contributed to some security issues, highlighting that HSTS isn't always a critical requirement for website security. This situation underscores the impact of knowledge gaps and how they can lead to misplaced pressures within teams. Additionally, thank you for sharing the KZfaq video-it provided valuable insights, even though it was originally shared on Google. We truly appreciate it.
@e.m.45123 күн бұрын
rule no. 1 never ever plug a random found usb stick in your personal computer
@lizzyeliz24 күн бұрын
UR INSANEEEEEEEEEE TYYSM ILYYY
@TECHN0120024 күн бұрын
Choose your hard!
@roeesi-personal25 күн бұрын
1:45AM HUFO here: Fuzzing is dumb, the moral should not be duplicate your code to make it more secure and the way they found the vuln was reading the code and understanding an attacker's input can go to the function where an assumption on it would be incorrect.