Home
Search results โ€œBuffer overflow in cryptography for dummiesโ€
Buffer Overflow Attack - Computerphile
 
17:30
Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike Pound details how it's done. The Stack: https://youtu.be/7ha78yWRDlE Botnets: https://youtu.be/UVFmC178_Vs The Golden Key: iPhone Encryption: https://youtu.be/6RNKtwAGvqc 3D Stereo Vision: https://youtu.be/O7B2vCsTpC0 Brain Scanner: https://youtu.be/TQ0sL1ZGnQ4 http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Views: 897783 Computerphile
What Is BUFFER OVERFLOW? | Overflow Of Input | Programming Errors Explained
 
04:45
Hello Everyone. In this video I am going to tell you about buffer overflow errors and vulnerability. What foes it mean, how it occurs, causes of this weakness in programming and its mechanism. I will also discuss about the potential threats which can occur due to this error in programming. So lets get started!! If you liked my video, please don't forget to press the like button and subscribe to my youtube channel. I will be posting videos on cyber security, ethical hacking and technology. Also some interesting tricks and techniques very soon so stay tuned and please SUBSCRIBE to my channel and thanks for watching....:-)
Views: 10002 Bitten Tech
How to exploit a buffer overflow vulnerability - Practical
 
09:44
This tutorial goes over the basic technique of how to exploit a buffer overflow vulnerability with an example. This tutorial assumes that you already have: basic C knowledge, gdb, gcc and how programs represent memory. The source code for the program can be downloaded at https://drive.google.com/file/d/0B8b0M2LATseXYWRiVHdkaGhwRjg/view?usp=sharing The 46 byte shellcode used in this program is "\x31\xc0\xb0\x46\x31\xdb\x31\xc9\xcd\x80\xeb\x16\x5b\x31\xc0\x88\x43\x07\x89\x5b\x08\x89\x43\x0c\xb0\x0b\x8d\x4b\x08\x8d\x53\x0c\xcd\x80\xe8\xe5\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68" The compiling line is gcc -o example -fno-stack-protector -m32 -z execstack example.c -fno-stack-protector === Removes the canary value at the end of the buffer -m32 === Sets the program to compile into a 32 bit program -z execstack === Makes the stack executable NOTE: If this tutorial is not working it is likely that you have aslr enabled. To disable it run the following command in your terminal echo 0 | sudo tee /proc/sys/kernel/randomize_va_space When you are finished I strongly recommend you turn it back on with the command echo 2 | sudo tee /proc/sys/kernel/randomize_va_space
Views: 115355 Daniel Slater
Buffer Overflow Attack Lecture (Part 1)
 
59:59
This lecture video covers how buffer overflow attack works. See Chapter 4 of my book (https://www.handsonsecurity.net/) for detailed explanation. We have also created a lab exercise for those who want to get a first-hand experience on this attack: http://www.cis.syr.edu/~wedu/seed/Labs_12.04/Software/Buffer_Overflow/.
Views: 19417 Kevin Du
First Exploit! Buffer Overflow with Shellcode - bin 0x0E
 
12:23
We write our first real exploit to get root access. Solving stack5 from exploit-exercises.com with a simple Buffer Overflow and shellcode. Run into some problems (illegal instruction): https://www.reddit.com/r/LiveOverflow/comments/54o705/found_what_i_think_is_a_slight_problem_in_the/ Stack Level 5: https://exploit.education/protostar/stack-five/ -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BufferOverflow #BinaryExploitation #Shellcode
Views: 106370 LiveOverflow
From Missingno to Heartbleed: Buffer Exploits and Buffer Overflows
 
06:15
http://tomscott.com - @tomscott - Buffer exploits are one of the basic bugs of computer science. They're responsible for glitches in games, for all sorts of viruses and exploits, and any number of technical disasters. Here's the basics of how they work, and a non-technical breakdown of Heartbleed, this week's rather startling attack.
Views: 498175 Tom Scott
How They Hack: Simple Buffer Overflow
 
07:37
I bashed this video together to show you the loose concept of a buffer overflow and how abusing inputs can enable an attacker to execute code or change the behaviour of a program in a noteworthy way. This example is very simple compared to more modern examples which are covered in my other videos.
Views: 14345 James Lyne
Basics of buffer overflow - Deep dive into exploit writing (exploit development)
 
37:13
A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. In this buffer overflow tutorial you can learn the basics of a buffer overflow attack. DOWNLOAD the virtual machine from Duckademy: http://www.duckademy.com/downloads This is the 2nd tutorial (Video 2) of the Deep dive into exploit writing course. Video 1: Setting up the environment for exploit writing (exploit development) https://youtu.be/djv7I_BrkdI Video 3: How to add payloads to an exploit https://youtu.be/bvL-3k6zW_o In this exploit writing (exploit development) tutorial on buffer overflow you will learn: 00:38 Theory of stack based buffer overflow 15:40 How to control the EIP Please note that this buffer overflow / exploit writing (exploit development) tutorial is for educational purposes only. SUBSCRIBE NOW FOR NEW TUTORIALS! https://www.youtube.com/c/DuckademyITcourses?sub_confirmation=1 SUBSCRIBE TO OUR EMAIL LIST! https://www.duckademy.com/#dialog-newsletter FOLLOW US! Facebook โ–บ https://www.facebook.com/duckademy Twitter โ–บ https://twitter.com/duckademy Google+ โ–บ http://gplus.to/duckademy Linkedin โ–บ https://www.linkedin.com/company/duckademy ----------------------------------------ยญ----------------------------------------ยญ--------------------------
Views: 12249 Duckademy IT courses
Buffer Overflows can Redirect Program Execution - bin 0x0D
 
07:23
This video shows you how to take over control of a program with a buffer overflow stack3: https://exploit.education/protostar/stack-three/ stack4: https://exploit.education/protostar/stack-four/ -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BufferOverflow #BinaryExploitation
Views: 38204 LiveOverflow
Software security - Buffer Overflow
 
06:11
software security - Buffer Overflow To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: https://www.youtube.com/playlist?list=PL2jykFOD1AWY1E3MB38_uOfpvEf4gnW80 ================================== About this course: This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
Views: 1498 intrigano
Network Security โ€“ Buffer Overflow
 
14:29
Course 3 - Hacking and Patching About this course: In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks. Who is this class for: Any one interested in learning how to hack and patch web apps with injection vulnerabilities, crack passwords on AWS P2 system, system security design pattern using hand-on labs, quick introduction to buffer overflow, Nessus scanning tool and Kali Penetration Testing suite. The needs to know how to program in a high level programming language. Module 3 - Memory Attacks and Defenses In this module, we learn about the typical protection mechanism provided by the modern OS to prevent process from accessing other pages data belong different process. We will also learn buffer overflow attacks and their common defenses. Learning Objectives โ€ข By the end of this course, you should be able to understand buffer overflow attacks and deploy their defenses. โ€ข By the end of this module, you can understand how the buffer overflow occurs. โ€ข By the end of this module, understand how turn off stack execution and adding canar pattern to calling stack can prevent buffer overflow from happening. Subscribe at: https://www.coursera.org
Views: 240 intrigano
Global variable Buffer Overflow to leak memory - 34C3 CTF readme_revenge (pwn)
 
16:13
Two years ago I failed to solve the readme challenge at the 32c3ctf. Since then I have learned a lot and I got another chance! readme 32c3ctf: https://www.youtube.com/watch?v=wLsckMfScOg readme_revenge: https://archive.aachen.ccc.de/34c3ctf.ccc.ac/challenges/index.html What is CTF? https://www.youtube.com/watch?v=8ev9ZX9J45A Why you should play CTFs: https://www.youtube.com/watch?v=rfjV8XukxO8 -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF #BinaryExploitation
Views: 42227 LiveOverflow
Hacking with Environment Variables in a Buffer Overflow Exploit
 
02:53
From Jon Erickson's "The art of Exploitation" - using environment variables to aid in a buffer overflow exploitation.
Views: 1620 Benjamin Kushigian
Ethical Hacking Tutorials in Hindi Class-12) | What is Buffer Overflow Explained
 
05:39
Hello friends In This Class We Will Learn That What Is Buffer Overflow and What Are The Different Types of Buffer overflow in Details. Follow Us On Facebook link https://www.facebook.com/TechnicalExpertHackers/ Like Share and Subscribe Youtube Channel "Technical Expert Hackers'" For more Videos https://youtu.be/fxvJc0kBV64 Kali Linux First Class https://youtu.be/H9UIaua7Nwk?list=PLAaMs54jGf5VinRN1DayB6or_FKEMk5JI Kali Linux Second Class https://youtu.be/FbdgwHELRB0?list=PLAaMs54jGf5VinRN1DayB6or_FKEMk5JI Ethical Hacking Course In Hindi Series https://youtu.be/v4DfOwN_Yac?list=PLAaMs54jGf5V7-2nn2RkKCfaWhw1InRIF Ethical Hacking In English Series https://youtu.be/odaHqorKKyw?list=PLAaMs54jGf5W_yRcUwVk8LoeJ1oXLTwhr Disclaimer : all the videos and classes are for educational purpose in this channel. please don't use these for hacking and some illegal purpose, if you do that you may be responsible for your act.
39  Buffer Overflow Attacks (CCNA SEC 210-260)
 
02:42
cisco ccna, CCNA security, 210-260, Help us caption & translate this video! http://amara.org/v/7IHR/
Views: 1112 Yamen Mehdizade
Buffer Overflows - CompTIA Security+ SY0-501 - 1.2
 
03:06
Security+ Training Course Index: http://professormesser.link/sy0501 Professor Messerโ€™s Course Notes: http://professormesser.link/501cn Frequently Asked Questions: http://professormesser.link/faq - - - - - A badly written application can open the door to mischief. In this video, youโ€™ll learn how a single buffer overflow can disrupt the security of an operating system. - - - - - Subscribe to get the latest videos: http://professormesser.link/yt Calendar of live events: http://www.professormesser.com/calendar/ FOLLOW PROFESSOR MESSER: Professor Messer official website: http://www.professormesser.com/ Twitter: http://www.professormesser.com/twitter Facebook: http://www.professormesser.com/facebook Instagram: http://www.professormesser.com/instagram Google +: http://www.professormesser.com/googleplus
Views: 79900 Professor Messer
Buffer Overflow
 
01:09
Demo on how to perform a buffer overflow attack on ubuntu system.
What is Buffer Overflow in Cyber Security Explained Hindi #HTTricks
 
12:51
HTTricks Reborn Youtube Channel :D Hi ๐Ÿ™Œ เคฆเฅ‹เคธเฅเคคเฅ‹เค‚ เคฆเฅ‹เคธเฅเคคเฅ‹เค‚ เค…เค—เคฐ เค†เคช เคธเฅ‹เคšเคคเฅ‡ เคนเฅ‡ เค•เคฟ เค†เคช YouTube เคชเคฐ Video เค•เฅ‹ เคฆเฅ‡เค–เค•เคฐ เค†เคช Hacker เคฌเคจ เคœเคพเค‚เคเค—เฅ‡ เคคเฅ‹ เค†เคช เค—เคฒเคค เคนเฅ‡ เค†เคช You Tube เคชเคฐ เคตเคนเคฟ เคšเคฟเคœเฅ‡ เคœเคพเคจ เคชเคพเคเค—เฅ‡ เคœเฅ‹ เคธเคฌ เค•เฅ‹ เคชเคคเคพ เคนเฅ‹เค—เคพ เคคเฅ‹ เค†เคช Hacker เค•เฅ‡เคธเฅ‡ เคนเฅเค เค…เค—เคฐ เค†เคชเค•เฅ‹ เคเคธเคพ Hacker เคฌเคจเคจเคพ เคนเฅ‡ เคœเฅ‹ เคตเคน เคธเคฌ เค•เคฐ เคธเค•เคคเคพ เคนเฅ‡ เคœเฅ‹ เค•เฅ‹เค‡ เคจเคนเคฟ เค•เคฐ เคธเค•เคคเคพ เคคเฅ‹ เค†เคชเค•เฅ‹ Youtube เค•เฅ‡ เคธเคพเคฅ-เคธเคพเคฅ E-Book เคชเคกเคผเคจเคฟ เคนเฅ‹เค—เคฟ เค“เคฐ Course เค•เคฐเคจเคฟ เคนเฅ‹เค—เคฟ เคคเฅ‹ เค“เค—เคฐ เค†เคชเค•เฅ‹ Hacking เค•เฅ‡ Course เคšเคพเคนเคฟเค เคคเฅ‹ เค†เคช เคฏเคนเคพ เคธเฅ‡ Download เค•เคฐ เคธเค•เคคเคพ เคนเฅ‡ เค“เคฐ เคตเคญเคฟ FREE เคฎเฅ‡ ๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š๐Ÿ˜Š ๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป ๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป ๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป๐Ÿ‘‡๐Ÿป Course -- For PC {White Hat Hacking}Course Powered by [Hacking & Technical Trick] This Course Password is -- White Het Hacking Download With Mediafire -- http://festyy.com/wA5iGN My Best Video #HTTRICKS ๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘ โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–„โ–„โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–„โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–“โ–“โ–“โ–“โ–“โ–“โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–“โ–“โ–“โ–“โ–“โ–“โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–“โ–“โ–“โ–“โ–“โ–“โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–“โ–“โ–“โ–“โ–“โ–“โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–“โ–“โ–“โ–“โ–“โ–“โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–“โ–“โ–“โ–“โ–“โ–“โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–€โ–‘โ–‘โ–‘โ–‘โ–€โ–€โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–‘โ–€โ–ˆโ–€โ–‘โ–‘โ–‘โ–€โ–ˆโ–€โ–‘โ–€โ–ˆโ–€โ–‘โ–€โ–ˆโ–€โ–‘โ–‘โ–€โ–ˆโ–€โ–€โ–€โ–€โ–ˆโ–‘ โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–ˆโ–‘โ–„โ–€โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–ˆโ–€โ–„โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–„โ–„โ–„โ–‘โ–‘โ–‘ โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–€โ–„โ–‘โ–‘โ–‘โ–‘โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ โ–‘โ–„โ–ˆโ–„โ–„โ–ˆโ–‘โ–„โ–ˆโ–„โ–‘โ–„โ–ˆโ–„โ–‘โ–‘โ–„โ–ˆโ–„โ–‘โ–„โ–ˆโ–„โ–„โ–„โ–„โ–ˆโ–‘ โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ ๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘ {1} Youtube Channel {HTTricks Reborn} -- https://www.youtube.com/c/HTTricksReborn {2} Facebook Page -- https://www.facebook.com/HTTricks/ {3} Instagram -- https://www.instagram.com/roshanhacker/ {4} My Blog --https://httricksreborn.blogspot.com {5} Twitter --https://twitter.com/HTTricks {6} Whatsapp Group --https://chat.whatsapp.com/40dNjrzAUjbCmha4VriSlS {7} Gmail [email protected] 8} My Number :- +917477466951
Views: 111 HTTricks Reborn
First Stack Buffer Overflow to modify Variable - bin 0x0C
 
11:21
We will write our first Buffer Overflow for the stack0 level of exploit-exercises.com. stack0: https://exploit.education/protostar/stack-zero/ Intel Reference: intel.de/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation #BufferOverflow
Views: 69638 LiveOverflow
The Heap: How to exploit a Heap Overflow - bin 0x15
 
12:11
We are solving heap1 from exploit-exercises.com by exploiting a heap overflow. -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation #HeapOverflow
Views: 42411 LiveOverflow
Hackers & Cyber Attacks: Crash Course Computer Science #32
 
11:53
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackersโ€”sometimes just amusement or curiosity, sometimes for money, and sometimes to promote social or political goals. Regardless, we're not going to teach you how to become a hacker in this episode but we are going to walk you through some of the strategies hackers use to gain access to your devices, so you can be better prepared to keep your data safe. *CORRECTION* AT 7:40 "whatever" should not have a leading ' The correct username field should be: whateverโ€™; DROP TABLE users; Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 245869 CrashCourse
Buffer Over flow Sql injection | Tutorial
 
07:42
BloodSecurity D4rkj1n :) Tutorials
Intro to Security CTFs for Beginners - Website Security Tutorial
 
28:23
Security CTFs? What are those? They are competitions with security challenges so that you can go out and practice your security skills! This video is a beginner tutorial for some easy and fun web security challenges! Find all 6 keys. Leave a comment on what keys you've found (I kept the server up until February 2019. I will no longer host the server. You can check the source code.): http://ctf.slothparadise.com Allan Wirth developed these web security drills. Be sure to drop him a tweet because it's awesome that he developed these intro web security drills for everyone! https://twitter.com/Allan_Wirth Check out the source code after you have found all the keys: https://github.com/allanlw/builds-hackme Do you want to compete in security CTFs? Check out the upcoming security CTFs here and register for one: https://ctftime.org/event/list/upcoming Intro to CTFs (video at the beginning): https://www.youtube.com/watch?v=bxt-JidP3bU EditThisCookie: https://chrome.google.com/webstore/detail/editthiscookie/fngmhnnpilhplaeedifhccceomclgfbg?hl=en First Key: 1:34 Second Key: 3:27 Third Key: 4:27 Fourth Key: 11:22 Fifth Key: 23:17 Sixth Key: 26:12 Intro to Crypto: https://www.youtube.com/watch?v=SUNaFniXYpA Songs used: https://soundcloud.com/aivisura/steven-universe-connie-piano-demo https://soundcloud.com/jafunkofficial/jafunk-this-thing-1 https://www.youtube.com/watch?v=8avMLHvLwRQ Outro song: https://www.youtube.com/watch?v=ptu5ldfr3WA Twitter: https://twitter.com/microwavesam Blog: http://slothparadise.com Consider supporting our group in making stuff: โ–บhttps://www.patreon.com/slothparadise
Views: 68690 MicrowaveSam
Ethical Hacking Course: Module 18 - Buffer Overflow Lab Session
 
12:45
As we covered everything about Buffer Overflow in theory session here - https://youtu.be/bQKRAuuk_Ac?list=PLsnGYhzCx6OBKJG8aBx8PMI7tvKoxEuKI we are going to see some live example in this demo session. Watch to learn more. Visit - http://gotowebsecurity.com/ to get complete guide for Ethical Hacking tutorial for beginners. Subscribe the channel for more free videos on Cyber Security Tips and Online Computer courses.
Views: 203 AppSec
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
 
09:27
We overflow a buffer and slowly figure out that we can control memory addresses to leak other data. The challenge files: https://github.com/Riscure/Rhme-2016 -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BufferOverflow #CTF
Views: 16273 LiveOverflow
Network Security (Buffer Overflow)
 
06:11
Buffer Overflow
Views: 470 lysender1
GETS Buffer Overflow | PicoCTF 2017 [41] "VR Gear Console"
 
10:29
Join the Family: https://discord.gg/Kgtnfw4 Support me on Patreon: https://patreon.com/johnhammond010 Learn to code with a TeamTreehouse Discount: treehouse.7eer.net/1WOz6 E-mail: [email protected] PayPal: http://paypal.me/johnhammond010 GitHub: https://github.com/JohnHammond Site: http://www.johnhammond.org Twitter: https://twitter.com/_johnhammond
Views: 2271 John Hammond
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21
 
12:17
We have a look at stack level 0 from exploit-exercises.com/Protostar and compile it on a current Ubuntu, to see if it's still exploitable. stack0: https://liveoverflow.com/binary_hacking/protostar/stack0.html digitalocean referral:* https://m.do.co/c/826f195e2288 -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation #BufferOverflow
Views: 42073 LiveOverflow
Fish Encryption IRC - Stack Buffer Overflow Vulnerability
 
07:10
Fish Encryption IRC - Stack Buffer Overflow Vulnerability URL: http://www.vulnerability-lab.com/get_content.php?id=18 The information provided in this test video is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Domains: www.vulnerability-lab.com - www.vuln-lab.com Contact: [email protected] - [email protected] - [email protected] Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact ([email protected] or [email protected]) to get a permission. Copyright ยฉ 2012 Vulnerability-Lab
Views: 918 vulnerability0lab
Smashing the Stack for Fun and Profit - setuid, ssh and exploit.education - bin 0x0B
 
09:41
This video introduces https://exploit.education, how to connect to the VM with ssh and explains what setuid binaries are. Phrack: http://phrack.org/issues/49/14.html Intel Reference: http://www.intel.de/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf Putty: http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation
Views: 56858 LiveOverflow
picoCTF 2018 [09] Assembly 0 & Buffer Overflow 0
 
13:29
Join the Family: https://discord.gg/Kgtnfw4 Support me on Patreon: https://patreon.com/johnhammond010 Learn to code with a TeamTreehouse Discount: treehouse.7eer.net/1WOz6 E-mail: [email protected] PayPal: http://paypal.me/johnhammond010 GitHub: https://github.com/JohnHammond Site: http://www.johnhammond.org Twitter: https://twitter.com/_johnhammond
Views: 4467 John Hammond
picoCTF 2018 [15] Buffer Overflow 1 & Hertz 2
 
08:59
Join the Family: https://discord.gg/Kgtnfw4 Support me on Patreon: https://patreon.com/johnhammond010 Learn to code with a TeamTreehouse Discount: treehouse.7eer.net/1WOz6 E-mail: [email protected] PayPal: http://paypal.me/johnhammond010 GitHub: https://github.com/JohnHammond Site: http://www.johnhammond.org Twitter: https://twitter.com/_johnhammond
Views: 3543 John Hammond
22C3: Advanced Buffer Overflow Methods [or] Smack the Stack
 
11:55
Speaker: Izik Cracking the VA-Patch A quick review of the standard buffer overflow exploit structure VA Patch, What it is and what it does to prevent buffer overflows. For more information visit: http://bit.ly/22c3_information To download the video visit: http://bit.ly/22c3_videos
Views: 565 Christiaan008
2. Control Hijacking Attacks
 
01:27:39
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 55740 MIT OpenCourseWare
Doing ret2libc with a Buffer Overflow because of restricted return pointer - bin 0x0F
 
10:38
Solving stack6 from exploit-exercises.com with the re2libc technique. stack6: https://exploit.education/protostar/stack-six/ -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #StackOverflow #BinaryExploitation
Views: 37983 LiveOverflow
Binary Exploitation, Heap-Based Buffer Overflow - Overwrite Function Pointer
 
01:16
PWN8 IN https://www.pwnerrank.com/tasks/heap-based-buffer-overflow-overwrite-function-pointer http://www.uchiha-hackers.co.il/
Views: 552 Afeck Berger
The Heap: what does malloc() do? - bin 0x14
 
09:52
Introducing the heap by looking at what malloc() does. -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 50397 LiveOverflow
Hacking Livestream #57: Google CTF 2018 Beginners Quest
 
04:00:00
How to solve the challenges 0:27:46 - challenge 1 (Letter) 0:30:59 - challenge 2 (OCR is cool!) 0:38:13 - challenge 3 (Floppy) 0:40:21 - challenge 4 (moar) 0:45:29 - challenge 5 (Floppy 2) 0:53:30 - challenge 6 (Security By Obscurity) 1:12:37 - challenge 7 (JS Safe 1) 1:40:01 - challenge 8 (firmware) 1:42:27 - challenge 9 (router-UI) 2:04:40 - challenge 10 (Admin UI 1) 2:07:45 - challenge 11 (Admin UI 2) 2:15:03 - challenge 12 (Admin UI 3) 2:29:39 - challenge 13 (motd) 2:37:39 - challenge 14 (gatekeeper) 2:39:53 - challenge 15 (media-DB) 2:46:50 - challenge 16 (poetry) 2:59:17 - challenge 17 (filter env) 3:14:55 - challenge 18 (fridge TODO list) 3:30:56 - challenge 19 (holey beep) Files from today: https://github.com/gynvael/stream-en/tree/master/057-beginners-quest
Views: 147797 GynvaelEN
[M18] Buffer Overflows - Introduction
 
01:17
Next http://youtu.be/YjSmGTYv4WY = Summary below = Module 01 - Phases of Penetration Testing * The 5 Phases of Penetration Testing http://youtu.be/uQrrSMXAujM Module 02 - Footprinting * Introduction http://youtu.be/8buGxgHxGnw * Whiteboard http://youtu.be/bw1CBD2GkKM * AnyWho http://youtu.be/G7mC3q07jek * nsLookup http://youtu.be/tRh0ngHXLZA * Path Analyzer Pro http://youtu.be/rIKNapdyoMQ * Ping http://youtu.be/wJDuOjnr2AM Module 03 - Scanning * Introduction http://youtu.be/w7QnSUGs10w * Whiteboard http://youtu.be/yxwQ8Ejsi7c * DNS Enumeration http://youtu.be/fvtPz7oa79E * DNS Overview and Zone Transfers http://youtu.be/oIptO0B6tlw * hPing3 http://youtu.be/KKRXf0gONAk * nikTo http://youtu.be/QWl5IQpjPYU * Performing a nMap scan http://youtu.be/zc5m0I6vpeA * Web Data Extraction http://youtu.be/9w-TXWQ-GFY Module 04 - Enumeration * Introduction http://youtu.be/CzRZOInKWMs * Whiteboard http://youtu.be/zinRkzQs2lY * GetAcct http://youtu.be/YzYAt3gvFcE * nbtStat http://youtu.be/NkafHmFqRPk * netDiscover http://youtu.be/A4REMvk5cYY * NetUse http://youtu.be/8ID7kXPmXjs * Null Session http://youtu.be/5i21VwUv1zI * Password List http://youtu.be/PWA1EZoeFqM * PsTools http://youtu.be/etM-YhlelDs * smbClient http://youtu.be/3sQVLSAf2Ls * SuperScan http://youtu.be/VXggfeAnh4U Module 05 - System Hacking * Introduction http://youtu.be/97Pnidm0mSk * Whiteboard http://youtu.be/AMUNiwqX19Y * ADS Spy http://youtu.be/E1l3JEmuPqA * How is Alternate Data Stream used to hack http://youtu.be/p_U8TrR1AK4 * Link Control Protocol http://youtu.be/aqz9NGElW04 * pwdump http://youtu.be/MjTMFS0TdfI * sethC http://youtu.be/RbdjED-cQOk * snow http://youtu.be/aCaH5zvs6XI * x.exe http://youtu.be/YWezjrEhv-E Module 06 - Trojans * Introduction http://youtu.be/y0tHtnZIUYQ * Whiteboard http://youtu.be/0UZOcgZOHUg * fPort http://youtu.be/fUO6V1wMHyY * ICMPserv http://youtu.be/-LpMonzRZ88 * MD5 http://youtu.be/qWC6NuKItLs * netStat http://youtu.be/In6cwOAvnH4 * PRCView http://youtu.be/GACOCDLKQcw * TcpView http://youtu.be/IWVjTORNE7E * Tini http://youtu.be/wQ4AGVFKjGU Module 07 - Viruses & Worms * Introduction http://youtu.be/8kgxoe_A-zQ * Whiteboard http://youtu.be/cK8-Tm_81mQ * bintext 1/2 http://youtu.be/3nCNEzaopB0 * bintext 2/2 http://youtu.be/_gYiRGg7sPY * DelME http://youtu.be/akbO89YwsrU * Internet Worm Maker Thing http://youtu.be/oCri9EbPpLA * JPS http://youtu.be/ynrO3QmsT_o Module 08 - Sniffing Traffic * Introduction http://youtu.be/HQYip9pFkcw * Whiteboard http://youtu.be/qLsH-NaiCVk * Driftnet http://youtu.be/6jV0uYZJSfg * macof http://youtu.be/xGrzcxObF64 * SMAC http://youtu.be/a5BFng9xy-E * tshark http://youtu.be/fNf80veMjVI * urlsnarf http://youtu.be/5DC22if9faE * WebSpy http://youtu.be/-CkSEnrUmbM Module 09 - Social Engineering * Introduction http://youtu.be/axV6WCTWyNs * Whiteboard http://youtu.be/JlcUMfvPti8 Module 10 - Denial of Service * Introduction http://youtu.be/5N-_F28tnig * Whiteboard http://youtu.be/eOUwOQdMp3U * hping3 http://youtu.be/K4_Ag-CgfEM * LOIC http://youtu.be/DPDwd5Ay2d4 Module 11 - Session Hijacking * Introduction http://youtu.be/MKGYTQsIPWs * Whiteboard http://youtu.be/qQtf3amzwJM * Ferret http://youtu.be/NiZlmTLgaLw * Hamster http://youtu.be/yx_jDMqdB10 Module 12 - Hacking Web Servers * Introduction http://youtu.be/cqB7rpBAal8 * Whiteboard http://youtu.be/m94oP96q3rE * dirbuster http://youtu.be/2tOQC68hAcQ * WPScan http://youtu.be/p6k3ozYY-NM Module 13 - Web Applications * Introduction http://youtu.be/t6jJTKqreE0 * Whiteboard http://youtu.be/5VSVKIEnEE8 * burpSuite http://youtu.be/rh2pvWcsLIY * HTTPRecon http://youtu.be/xBBHtS-dwsM * IDServe http://youtu.be/7qb9p_Hs6wo * nikTo http://youtu.be/xOliB8koo9I * VirusTotal http://youtu.be/3q5xYX_EhHE * wget http://youtu.be/kCmUipDn-Uc Module 14 - SQL Injection * Introduction http://youtu.be/9uwG0SEfd94 * Whiteboard http://youtu.be/PmRKHTSpWS8 * BlindElephant http://youtu.be/gzVdMd6l_js * phpID http://youtu.be/uZdHDNXMQkE * sqlmap http://youtu.be/SfpmPxMyJLA Module 15 - Wireless * Introduction http://youtu.be/QtMeTVNmeM4 * Whiteboard http://youtu.be/fbWWnRkuAnw * airodump-ng http://youtu.be/98bFAqzGfdI * airomon http://youtu.be/dNqIybLB0Q0 * Kismet http://youtu.be/Qvd0Hh6FQPM Module 16 - Mobile Hacking * Introduction http://youtu.be/VMoIGWXNhow * Whiteboard http://youtu.be/Ms3q3Qi2kBQ Module 17 - IDS, Firewalls & Honeypots * Introduction http://youtu.be/7oaagKAvu4U * Whiteboard http://youtu.be/WOw6hbX7jlk Module 18 - Buffer Overflows * Introduction http://youtu.be/3TW_XAJbxdI * Whiteboard http://youtu.be/YjSmGTYv4WY * make, compile, run http://youtu.be/aT3OPCBJSTM * stack http://youtu.be/0jQHKtJc_uI Module 19 - Cryptography * Core Principles of Cryptography http://youtu.be/guCfp2tI704 * Whiteboard http://youtu.be/tmoHJbghBoQ * Advanced Encryption Package http://youtu.be/08ZvcjDUf20 * CrypTool http://youtu.be/kH8UY7f2TQM * Hash Calc http://youtu.be/qDxGoRuVQwk * HashMyFiles http://youtu.be/VTVRV03bPAk Source http://bit.ly/1J6jhd1
Views: 105 Nicolas Quenault
PWN Overflow | CSAW CTF "BigBoy"
 
08:12
Join the Family: https://discord.gg/Kgtnfw4 Support me on Patreon: https://patreon.com/johnhammond010 Learn to code with a TeamTreehouse Discount: treehouse.7eer.net/1WOz6 E-mail: [email protected] PayPal: http://paypal.me/johnhammond010 GitHub: https://github.com/JohnHammond Site: http://www.johnhammond.org Twitter: https://twitter.com/_johnhammond
Views: 6539 John Hammond
Crash Course On Crashing! Buffer Overflow demonstration
 
14:23
Just a quick demo of a buffer overflow against a web server. The video quality is poor, but you can follow along and get the idea. I'm pretty rough on video, but trying to get better and learning as I go. Looking forward to any constructive feedback! Thanks for watching :)
Views: 899 Ryan Lindfield
Software security - Memory Layout
 
10:58
software security - Memory Layout To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: https://www.youtube.com/playlist?list=PL2jykFOD1AWY1E3MB38_uOfpvEf4gnW80 ================================== About this course: This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
Views: 1880 intrigano
SHA: Secure Hashing Algorithm - Computerphile
 
10:21
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings. EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Views: 521492 Computerphile
Hacking Livestream #9: Attacking stack cookies
 
01:22:54
The topic of this stream will be announced during the stream itself.
Views: 3421 GynvaelEN
22C3 - Advanced buffer overflow methods
 
11:55
22C3: Private Investigations The European Hacker Conference The 22nd Chaos Communication Congress (22C3) is a four-day conference on technology, society and utopia. The Congress offers lectures and workshops on a multitude of topics including (but not limited to) information technology, IT-security, internet, cryptography and generally a critical-creative attitude towards technology and the discussion about the effects of technological advances on society.
Views: 75 HackersOnBoard
Format String Vulnerability Lecture
 
01:06:03
This lecture explains what the format string vulnerability is and how to exploit such a vulnerability. See Chapter 6 of my book https://www.handsonsecurity.net/ for detailed explanation. We have developed a lab to give students a hands-on experience on the attack: http://www.cis.syr.edu/~wedu/seed/Labs_12.04/Software/Format_String/.
Views: 5443 Kevin Du
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
 
13:18
This challenge was part of the FLARE-On 2018 CTF. In this video we reverse engineer a basic windows .exe to find out how to win the game. At first we tried to attack the weak crypto but failed. At the end it turns out I had a bug in my code :( Flare-On: https://www.flare-on.com/ -=[ ๐Ÿ”ด Stuff I use ]=- โ†’ Microphone:* https://amzn.to/2LW6ldx โ†’ Graphics tablet:* https://amzn.to/2C8djYj โ†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM โ†’ Lens for streaming:* https://amzn.to/2CdG31I โ†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj โ†’ Camera#2 for electronics:* https://amzn.to/2LWxehv โ†’ Lens for macro shots:* https://amzn.to/2C5tXrw โ†’ Keyboard:* https://amzn.to/2LZgCFD โ†’ Headphones:* https://amzn.to/2M2KhxW -=[ โค๏ธ Support ]=- โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ ๐Ÿ• Social ]=- โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ ๐Ÿ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #ReverseEngineering #CTF
Views: 122126 LiveOverflow
MIT Beaverworks Embedded Security Microcorruption Buffer Overflow Attack
 
02:43
Short Video Assignment for BWSI18 Covers Buffer Overflow Attack Demonstration on Microcorruption Hanoi
Views: 104 Alex sun
Securing Stream Ciphers (HMAC) - Computerphile
 
09:24
Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is spelled incorrectly on the graphic. http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Views: 126431 Computerphile