Home
Videos uploaded by user β€œLiveOverflow”
Searching for Bitcoins in GitHub repositories with Google BigQuery
 
04:28
People leak stuff on github all the time. ssh private keys, national ID scans, ... Maybe we can find some Bitcoin private keys and get rich!? Google BigQuery: https://cloud.google.com/bigquery/ GitHub BigQuery Dataset: https://cloud.google.com/bigquery/public-data/github -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #SecurityResearch
Views: 196370 LiveOverflow
Global Offset Table (GOT) and Procedure Linkage Table (PLT) - bin 0x12
 
06:58
In this video we will introduce how shared libraries like libc are used by C programs. Specifically we will look at the Global Offset Table and the Procedure Linkage Table. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 27912 LiveOverflow
What is CTF? An introduction to security Capture The Flag competitions
 
06:46
CTFs are one of the best ways to get into hacking. They require a lot of work and dedication, but are highly rewarding and teach you a lot. Here is a quick introduction on how to get started with CTFs. CTFtime: https://ctftime.org/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF
Views: 132095 LiveOverflow
A simple Format String exploit example - bin 0x11
 
10:01
Solving format1 from exploit-exercises.com with a simple Format String vulnerability, exploited with %n. stack layout: https://www.win.tue.nl/~aeb/linux/hh/stack-layout.html format1: https://exploit.education/protostar/format-one/ CTF format string exploit: https://gist.github.com/LiveOverflow/937b659c9a37be099ddd -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation #FormatString
Views: 51667 LiveOverflow
The Heap: How do use-after-free exploits work? - bin 0x16
 
08:42
Solving heap2 from exploit.education to learn about heap use-after-free (UAF) exploits heap2: https://exploit.education/protostar/heap-two/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation #UseAfterFree
Views: 29181 LiveOverflow
Don't trust time
 
09:49
Clickbait title. Just a bit of brain food. Games, licenses and many other things depend on a good time source. But where does the time come from and should you trust it? -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 180550 LiveOverflow
Injection Vulnerabilities - or: How I got a free Burger
 
03:57
One night I ordered food and I accidentally injected a Burger into the order. The delivery guy confused a comment as another item on the order list and made it. Even though no price was attached to it. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 299522 LiveOverflow
CSRF Introduction and what is the Same-Origin Policy? - web 0x04
 
10:25
What is cross site request forgery and what does it have to do wwith the same-origin policy. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #WebSecurity
Views: 40292 LiveOverflow
Analysing a Collection of Windows Binaries and Embedded Resources - FLARE-On 2018
 
12:04
In this video we look at another FLARE-On 2018 challenge. This one is weird as we have to somehow automate the analysis of a big collection of binaries. We also learn something about embedded resources. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #ReverseEngineering #CTF
Views: 65688 LiveOverflow
Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195
 
04:06
Had a little bit of fun using dirtycow local root exploit on a server from pwnerrank.com. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF #CVE
Views: 26819 LiveOverflow
Analysing a Firefox Malware browserassist.dll - FLARE-On 2018
 
16:26
This is another challenge of the FLARE-On 2018 CTF. This challenge is about analysing the functionality of a Firefox malware, but I got really lucky :D -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #MalwareAnalysis #ReverseEngineering #CTF
Views: 97323 LiveOverflow
How to learn hacking? ft. Rubber Ducky
 
09:01
A more philosophical video about what it means to learn about hacking and exploitation. Using the Rubber Ducky as a scapegoat to make a point against learning tools vs. principals. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 90903 LiveOverflow
Fuzzing Browsers for weird XSS Vectors
 
09:16
We have a look at another interesting XSS vector due to weird Firefox parsing, and then explore how researchers find this stuff. Gareth's tweet: https://twitter.com/garethheyes/status/1112661895067156481 insertScript's vector: http://shazzer.co.uk/vector/lt-eating-char -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 34808 LiveOverflow
Uncrackable Program? Finding a Parser Differential in loading ELF - Part 2/2 - bin 0x08
 
08:04
Can programs be uncrackable? Let's try to find some anti-debugging tricks. https://www.sentinelone.com/blog/breaking-and-evading/ http://blog.ioactive.com/2012/12/striking-back-gdb-and-ida-debuggers.html?m=1 PoC||GTFO Journal # 0x00 -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 48654 LiveOverflow
Linear independence and GF(2) - 34C3 CTF software_update (crypto) part 2/2
 
14:27
In this video we only focus on the mathematical solution for software_update from the 34c3 CTF. sage script: https://gist.github.com/LiveOverflow/104adacc8af7895a4c14cea4a5236ecc -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF #Cryptography
Views: 23017 LiveOverflow
Fuzzing with radamsa - Short
 
03:27
Radamsa is a test case generator for robustness testing, a.k.a. a fuzzer. And it does it super well. Perfect for rapid prototyping. radamsa: https://github.com/aoh/radamsa -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 17053 LiveOverflow
The Heap: what does malloc() do? - bin 0x14
 
09:52
Introducing the heap by looking at what malloc() does. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 45286 LiveOverflow
How (not) to ask a technical question
 
07:47
I try to answer every question I get. Unfortunately a lot of them are extremely low effort and waste my time. I love to help, but please put some work into your question. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 140877 LiveOverflow
Reversing and Cracking first simple Program - bin 0x05
 
09:03
A very simple reversing challenge for Linux GitHub: https://github.com/LiveOverflow/liveoverflow_youtube/tree/master/0x05_simple_crackme_intro_assembler http://crackmes.de http://www.hopperapp.com/ https://www.hex-rays.com/products/ida/ https://github.com/radare/radare2 -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #ReverseEngineering
Views: 147006 LiveOverflow
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
 
13:18
This challenge was part of the FLARE-On 2018 CTF. In this video we reverse engineer a basic windows .exe to find out how to win the game. At first we tried to attack the weak crypto but failed. At the end it turns out I had a bug in my code :( Flare-On: https://www.flare-on.com/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #ReverseEngineering #CTF
Views: 110755 LiveOverflow
†: Some things I got wrong with JS Safe 2.0 - Google CTF 2018
 
05:30
I got some stuff very wrong, so I really felt like making a proper update video to explain it. main video: https://www.youtube.com/watch?v=8yWUaqEcXr4 -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF
Views: 18498 LiveOverflow
LiveOverflow Channel Introduction and Backstory - bin 0x00
 
03:14
A little bit of background why I created this channel and what you can expect. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 169791 LiveOverflow
What is PHP and why is XSS so common there? - web 0x02
 
10:40
We learn about simple php web apps and why it's so common that php applications have XSS issues. It's all about shitty tutorials. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #WebSecurity
Views: 62396 LiveOverflow
How safe is a Wifi Cloud Hub Router (from hackers)?
 
10:12
Exploring a cheap embedded device and writing an exploit for it. Showing off how easy some devices can be hacked. Thanks Ligius! http://hackcorrelation.blogspot.de/ -=[ πŸ’» Related Products ]=- β†’ Strontium Mobile Wifi Cloud:* https://amzn.to/2H3aYUg β†’ i.onik WIFI Cloud Hub:* https://amzn.to/2CcI5PA -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #SecurityResearch
Views: 21639 LiveOverflow
TROOPERS 17 - PacketWars solved with an iPhone
 
05:04
We only had a phone and solved challenges with online tools before the teams did it. Solved with Online OCR and WebArchive Troopers Students: https://www.troopers.de/students/ Troopers: https://www.troopers.de/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF
Views: 15676 LiveOverflow
Regular expression as Finite-state machine - Short
 
02:09
A short introduction to regular expressions and how you can visualise them. It's very helpful when auditing input validation. Debuggex: https://www.debuggex.com Solving Pokemon Blue With a Single Regex? https://www.youtube.com/watch?v=Q2g9d29UIzk -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 17590 LiveOverflow
Using z3 to find a password and reverse obfuscated JavaScript - Fsec2017 CTF
 
10:33
Recently I attended fsec 2017 in croatia. And there was a cool CTF challenge I solved during the conference that I wanted to share. script: https://gist.github.com/LiveOverflow/11bde6352f52be33864f1fd657e7cde1 -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF
Views: 36663 LiveOverflow
Student Finds Hidden Devices in the College Library - Are they nefarious?
 
18:27
A reddit user finds raspberry pi zeros hidden behind trash cans, vending machines and other places in the college library. We reverse engineer them and determine if they are malicious. DirtyCOW video including "files" in Linux: https://www.youtube.com/watch?v=kEsshExn7aE -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #ReverseEngineering
Views: 3273899 LiveOverflow
Doing ret2libc with a Buffer Overflow because of restricted return pointer - bin 0x0F
 
10:38
Solving stack6 from exploit-exercises.com with the re2libc technique. stack6: https://exploit.education/protostar/stack-six/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #StackOverflow #BinaryExploitation
Views: 33839 LiveOverflow
Explaining Dirty COW local root exploit - CVE-2016-5195
 
12:17
Video walkthrough the dirtyc0w privilege escalation exploit. Exploiting a Kernel race-condition. site: http://dirtycow.ninja/ Patch: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619 Page Table Entry: https://www.kernel.org/doc/gorman/html/understand/understand006.html Madvise code: https://github.com/torvalds/linux/blob/5924bbecd0267d87c24110cbe2041b5075173a25/mm/madvise.c#L452 GUP code: https://github.com/torvalds/linux/blob/master/mm/gup.c -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CVE #SecurityResearch
Views: 163413 LiveOverflow
Syscalls, Kernel vs. User Mode and Linux Kernel Source Code - bin 0x09
 
13:24
We will have a look at what syscalls are and what it has to do with the kernel mode an user mode. We do this by exploring a kernel function and trace it down to the assembler level. join the discussion: https://www.reddit.com/r/LiveOverflow/comments/415sxb/0x09_syscalls_kernel_vs_user_mode_and_linux/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 67870 LiveOverflow
TCP Protocol introduction - bin 0x1A
 
09:23
Before we continue with the network challenges, let's first introduce the TCP protocol properly. Using netcat and wireshark to understand it. HTTP Protocol episode: https://www.youtube.com/watch?v=C_gZb-rNcVQ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #NetworkSecurity
Views: 16801 LiveOverflow
Identifying Good Research to actually Learn Something - Cross-site Scripting
 
17:43
How to get good at XSS? There are a lot of charlatans out their overhyping by posting misleading content. It's infuriating because a lot of the actual research is less flashy and thus more hidden. Maybe I'm a bit too pessemistic in this video, but I think it's a concrete example we can use talk about it. XSS Introduction: https://www.youtube.com/watch?v=8GwVBpTgR2c&index=4&list=PLhixgUqwRTjx2BmNF5-GddyqZcizwLLGP uXSS in Safari: https://www.youtube.com/watch?v=0uejy9aCNbI Cross-Origin Stylesheets: https://www.youtube.com/watch?v=bMPAXsgWNAc Gareth Heyes: https://twitter.com/garethheyes -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. https://amzn.to/2SESPO0 switch jetson TX1 https://amzn.to/2C6uw4m
Views: 96000 LiveOverflow
XSS on Google Search - Sanitizing HTML in The Client?
 
12:58
An actual XSS on google.com by Masato Kinugawa. It abuses a parsing differential between a JavaScript enabled and disabled context. The fix: https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 284089 LiveOverflow
PHP include and bypass SSRF protection with two DNS A records - 33c3ctf list0r (web 400)
 
09:03
Easy solution of list0r web challenge from the 33c3ctf thanks to unintended bugs in the challenge. Join the discussion: https://www.reddit.com/r/LiveOverflow/comments/5p5yci/php_include_and_bypass_ssrf_protection_with_two/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF #WebSecurity
Views: 17423 LiveOverflow
OsmocomBB: Open Source GSM Implementation - Motorola Calypso Chip
 
10:34
Calypso Chip: https://osmocom.org/projects/baseband/wiki/HardwareCalypso -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #MobileSecurity
Views: 40055 LiveOverflow
Rediscovering the f00dbabe Firmware Update Issue - Hardware Wallet Research #7
 
13:01
We finally figure out how to create a firmware update, but we run into an annoying check. But based on what we have learned so far, we can find a bypass - rediscovering the f00dbabe issue. research: https://wallet.fail DISCLAIMER: The security research shown here was done a while ago and since then the software and hardware was updated; These videos are not sponsored or endorsed by Ledger. -=[ πŸ’» Related Products ]=- β†’ Ledger Nano S:* https://amzn.to/2VAhMvM β†’ USB Hub with switches:* https://amzn.to/2SJuaYv β†’ any STM32 Nucleo-64 development board:* https://amzn.to/2VDDE9J -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #HardwareSecurity #ReverseEngineering
Views: 32094 LiveOverflow
Hardware Power Glitch Attack - rhme2 Fiesta (FI 100)
 
12:47
We perform a fault injection on an arduino board to break out of a endless loop. We drop the power for a very short amount of time so the microprocessor calculates something wrong. Skip to 0:56 if you don't want to see my cringy acting. The full verilog code: https://gist.github.com/LiveOverflow/cad0e905691ab5a8a2474d483a604d67 -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF #HardwareSecurity
Views: 39349 LiveOverflow
How do SIM Cards work? - SIMtrace
 
11:09
In this video we use SIMtrace to intercept the communication between the phone and SIM card to understand how that works. This is part 1 in a series introducing mobile security. Vadim Yanitskiy: https://twitter.com/axilirator Osmocom: https://osmocom.org/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #MobileSecurity
Views: 701725 LiveOverflow
Hacking Competition in Zhengzhou China - Real World CTF Finals 2018
 
12:47
Hacking Competition in China. Our team qualified for the Real World CTF finals in China organised by Chaitin Tech, which was a really awesome CTF. In this video I want to share my experience and thoughts about the event. Official Video: https://www.youtube.com/watch?v=cYVoJWNVngE Real World CTF: https://realworldctf.com/ -=[ πŸ’» Related Products ]=- β†’ Filmed with:* https://amzn.to/2RgVhgN β†’ Ledger Nano S:* https://amzn.to/2VAhMvM β†’ USB Hub with switches:* https://amzn.to/2SJuaYv β†’ any STM32 Nucleo-64 development board:* https://amzn.to/2VDDE9J β†’ Trezor:* https://amzn.to/2FjJaZ7 -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CVE #CTF
Views: 389696 LiveOverflow
Riscure Embedded Hardware CTF setup and introduction - rhme2 Soldering
 
07:06
Soldering the arduino board, installing drivers for OSX and flash challenges with avrdude. The CTF will run until the end of February, the other videos will come after that. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 23898 LiveOverflow
Solving a JavaScript crackme: JS SAFE 2.0 (web) - Google CTF 2018
 
15:01
Solving a crackme implemented in JavaScript that attempts to obfuscate the algorithm through some anti-debugging. Solution Script / HTML: https://gist.github.com/LiveOverflow/bbdffe3777ce0f008b452e0a789cef65 John Hammond: https://www.youtube.com/user/RootOfTheNull -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF
Views: 224584 LiveOverflow
End-to-End Encryption in the Browser Impossible? - ProtonMail
 
10:48
A recent paper about ProtonMail's E2EE makes us wonder if the technology simply doesn't allow us to implement such solutions. An Analysis of the ProtonMail Cryptographic Architecture - Nadim Kobeissi https://eprint.iacr.org/2018/1121 ProtonMail response: https://www.reddit.com/r/ProtonMail/comments/9yqxkh/an_analysis_of_the_protonmail_cryptographic/ea3g0hm/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #Cryptography
Views: 72528 LiveOverflow
MMORPG Bot Reverse Engineering and Tracking
 
09:46
A friend told me that a GW2 trading bot implemented a dumb API. We are going to find and use it to track the bot. Play Guild Wars 2: https://account.arena.net/register Fiddler: https://www.telerik.com/fiddler .NET Reflector: https://www.red-gate.com/products/dotnet-development/reflector/ HxD: https://mh-nexus.de/en/hxd/ IDA Free: https://www.hex-rays.com/products/ida/support/download_freeware.shtml Windows VM: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #ReverseEngineering
Views: 432524 LiveOverflow
Bash injection without letters or numbers - 33c3ctf hohoho (misc 350)
 
11:09
This challange was an amazing team effort. There were multiple steps necessary for the solution and different people contributed. The final big challenge was a bash eval injection, but without using any letters or numbers. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF
Views: 45573 LiveOverflow
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21
 
12:17
We have a look at stack level 0 from exploit-exercises.com/Protostar and compile it on a current Ubuntu, to see if it's still exploitable. stack0: https://liveoverflow.com/binary_hacking/protostar/stack0.html digitalocean referral:* https://m.do.co/c/826f195e2288 -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation #BufferOverflow
Views: 37915 LiveOverflow
How a CPU works and Introduction to Assembler - bin 0x04
 
11:52
How a CPU works. An introduction to reading assembler instructions. https://microcorruption.com/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #ReverseEngineering
Views: 121320 LiveOverflow
Introducing Weird Machines: ROP Differently Explaining part 1 - bin 0x29
 
11:59
Let's introduce the concept of a weird machine in order to understand ROP differently. It's maybe a bad tutorial. What Hacker Research Taught Me: https://www.youtube.com/watch?v=Dd9UtHalRDs Science of Insecurity: https://www.youtube.com/watch?v=3kEfedtQVOY A Patch for Postel’s Robustness Principle: http://langsec.org/papers/postel-patch.pdf Exploit Programming From Buffer Overflows to β€œWeird Machines” and Theory of Computation: http://langsec.org/papers/Bratus.pdf -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation
Views: 33278 LiveOverflow
Defeat 2FA token because of bad randomness - rhme2 Twistword (Misc 400)
 
10:25
Generating random numbers on computers is not easy. And while the intended solution was really hard, the challenge had a problem with the random number generation, which allowed me to solve it. Clarification from Andres Moreno (riscure) on the challenge: "The "official" challenge solution involved reading the tiny Mersenne twister (tinyMT) paper, writing some equations, and using a solver. The tinyMT is tricky to initialize. Giving a proper seed is not enough. You need to provide initial state matrices with certain properties (there is a generator for this). The challenge used improper initialized matrices (zeros) that reduced the PRNG period. During tests, we found that ~12hr were needed to solve the challenge (solver time only), but we did not test the amount of entropy reduction by improper state initialization. Fortunately, the problem was not in the PRNG." -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF #Cryptography
Views: 21305 LiveOverflow
Failing easy local file inclusion challenge - mindreader (misc) Google CTF 2017
 
06:50
At first I was not able to solve the mindreader challenge and then I got spoiled. I have a critical look at my approach and figured out two major mistakes I made. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF #WebSecurity
Views: 27741 LiveOverflow

Here!
Black cocks fucking white sluts free pics
Students and online dating
Free fucking movie porn
Here!