Description :
The simple tutorial of writing an exploit code based on STACK OVERFLOW vulnerability in Windows
Hope this tutorial can give an insight, sorry if i made some mistakes and so my bad English. :)
Chapters :
0:00 Introduction to the Stack Memory, Processor Registers, and Function
4:55 The Illustration of when the Buffer Overflow Occurred
11:07 Basic Concept of Operating System - Kernel and User Mode
16:05 Writing simple Assembler code to write an 'A' letter by directly calling the MS-DOS API Interrupt Function, and watching the value in the CPU's Registers
41:20 Real World Diagram and Traffic Inspection : HTTP GET REQUEST TO PORT NO 80
56:56 Fuzzing : Sending a HTTP GET "AAAAAAAAAAAAAAA.. " and see what will be happen to the application
1:05:00 Running/Attaching the application inside the Ollydbg
1:13:00 When the application crash, and the EIP replaced with '41414141'
1:31:49 Finding the Offset / location of EIP and Stack when it replaced, by sending the unique patterns
1:53:02 The 'idea' of redirecting the flow of the application to execute the Payload in the Stack
2:02:19 The trick : use JMP ESP and find the address of that instruction in the memory
2:17:02 Put the JMP ESP address in our exploit code
2:23:46 Creating the Payload : Calculating the space for the Payload
2:33:20 Creating the Payload : Looking for the "ready made" shellcode
2:38:05 Creating the Payload : Using metasploit to generate our payload/shellcode
2:43:37 Final step : Inserting the shellcode into our exploit code and execute it
Thank you so much for watching, and hope you enjoy this video.
If you have any question just put in the comments bellow.
PS: Again, sorry if i made some mistakes and my bad English. :)
buffer overflow,exploit,hacking tutorial,exploit tutorial,exploit development tutorial,reverse engineering,buffer overflow tutorial,buffer overflow attack,buffer overflow explained,32-bit buffer overflows,basic buffer overflow,buffer overflow tutorial step by step,stack overflow,binary exploitation,stack smashing,fuzzing,metasploit,exploitation,writing exploit,hacking,how to hack,ethical hacking tutorial,ethical hacking,buffer overflow exploit
Информация по комментариям в разработке