У нас вы можете посмотреть бесплатно How to debug your exploit and payloads - Binary Exploitation PWN101 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this video we will attach a debugger to our exploit and debug the various payloads and crafted inputs we may need in order to successfully exploit the binary. Debugging the exploit is extremely useful whenever you want to know if your payload is arranged in memory how you expect, or if you are parsing and correctly crafting a given payload. This technique is useful for every debugger, but especially with radare2 since you can't run embedded python (or other scripting languages) commands. Pwntools' proc module: https://docs.pwntools.com/en/stable/u... 00:00 - Intro 03:05 - Pwntools' proc module 03:24 - wait_for_debugger() 04:10 - pidof() 04:55 - Practice 05:15 - Exploit skeleton 05:43 - Using pidof() and wait_for_debugger() 06:18 - Reversing the sample 08:10 - Spotting the vulnerability 09:15 - Executing the sample 09:40 - Using wait_for_debugger() and pidof() 11:09 - Debugging the exploit 13:00 - Second use case 13:51 - New exploit 15:10 - Debugging the exploit 17:00 - Recap 18:20 - Outro[*] Exploit code, not people. LinkedIn: / razvioverflow Did you like the video? Found it useful? If you feel like lending a hand consider buying me a coffee (or three ☕), it really helps! https://ko-fi.com/razvioverflow https://paypal.me/razvigg Twitter: @Razvieu *Outro track: Etsu - Selcouth GG