Buffer Overflow Hacking Tutorial (Bypass Passwords)

Learn Buffer Overflows from one of the masters - Stephen Sims - SANS instructor, course developer and well known reverse engineer with over 20 years of experience!
Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: brilliant.org/DavidBombal
// A bit about Stephen //
Stephen is an industry expert with over 20 years of experience in information technology and security. He's authored SANS most advanced course, SEC760: Advanced Exploit Development for Penetration Testers, was the 9th person in the world to earn the GIAC Security Expert certification (GSE), and co-author of the Gray Hat Hacking book series, as well as a keynote speaker who's appeared at RSA USA and APJ, OWASP AppSec, BSides events and more. On top of all this, Stephen is Curriculum Lead for SANS Offensive Operations.
// Stephen's Social //
Twitter: / steph3nsims
KZread Live: www.youtube.com/@OffByOneSecu...
KZread videos: www.youtube.com/@OffByOneSecu...
E-mail: Stephen(at)deadlisting.com
SANS: www.sans.org/profiles/stephen...
// Stephen's Book //
Grey Hat Hacking: amzn.to/3B1FeIK
// David's Social //
Discord: / discord
X: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
// Menu //
00:00 - Buffer overflows
00:50 - Sponsor
01:36 - Stephen Sims introduction
03:21 - Overview of buffer overflows
04:44 - Future of buffer overflows
09:17 - C program demo
14:14 - strcopy vulnerability
14:45 - Shell code role
18:45 - Rust vs C?
20:05 - Rust vs other languages
21:23 - Heap & stack memory
26:32 - SigRed vulnerability
29:02 - DNS query role
30:49 - Heap overflow cause
35:00 - No args program check
37:06 - Program overview
41:10 - Hex & Stack
42:29 - Buffer overflow demo
42:53 - Determining buffer size
45:03 - Authentication bypass
50:33 - ASLR & Exploitation
52:01 - Memory & Environment
// Detailed outline of video: //
00:00:01 - Buffer overflow intro
00:00:12 - Pattern tool importance
00:00:27 - Overwriting return point
00:00:38 - Return to system function
00:00:44 - Authentication bypass success
00:00:50 - Advert
00:01:58 - Stephen's intro & channel
00:03:21 - Stephen on buffer overflows
00:03:42 - Buffer overflow history
00:04:18 - Mitigations & shadow stacks
00:04:44 - Future of buffer overflows
00:05:54 - Shadow stack obstacles
00:06:04 - Understanding tech basics
00:06:19 - Microsoft & IoT implementations
00:06:27 - Buffer overflow concept
00:08:53 - Buffer overflow explanation
00:09:17 - C program demo
00:11:04 - User input handling
00:12:53 - 'A' letter in debugging
00:13:47 - Vulnerable program recap
00:14:14 - strcopy vulnerability
00:14:45 - Shell code role
00:15:42 - Stack overflow goal
00:15:58 - Mitigation techniques
00:16:18 - Data execution prevention
00:18:29 - Stack pop & language benefits
00:18:38 - Old-school attacks
00:18:45 - Rust vs C?
00:18:52 - Microsoft & Rust
00:19:20 - Rust benefits
00:19:37 - Transitioning to Rust
00:20:05 - Rust vs other languages
00:20:34 - C++ legacy queries
00:20:57 - Retraining devs
00:21:13 - Command line intro
00:21:23 - Heap & stack memory
00:21:42 - Memory code segment
00:22:03 - Stack memory understanding
00:22:37 - Dynamic memory usage
00:26:32 - SigRed vulnerability
00:27:13 - Disassembly importance
00:27:46 - Machine code relation
00:28:01 - Vulnerable code snippets
00:28:35 - Size argument complexity
00:29:02 - DNS query role
00:29:56 - Memory allocation in DNS
00:30:49 - Heap overflow cause
00:31:53 - Server-side vulnerability
00:32:18 - Explanation compliments
00:32:21 - Mitigation discussion
00:34:10 - Checking ID
00:34:16 - UID & processes
00:34:32 - C arguments
00:35:00 - No args program check
00:35:46 - Calling vulnerable function
00:36:05 - Creating checkpw function
00:37:06 - Program overview
00:37:55 - Buffer overflow talk
00:38:27 - Program compiling
00:41:10 - Hex & Stack
00:41:18 - checkpw vulnerability
00:41:44 - Buffer size
00:42:29 - Buffer overflow demo
00:42:53 - Determining buffer size
00:44:06 - Return pointer exploit
00:45:03 - Authentication bypass
00:46:47 - Return-to-libc & DEP
00:47:16 - System function manipulation
00:47:45 - Memory address exploit
00:49:23 - Command execution
00:50:33 - ASLR & Exploitation
00:52:01 - Memory & Environment
00:53:48 - Return-to-libc talk
buffer
buffer overflow
buffer overflow attack
windows
linux
exploits
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#bufferoverflow #linux #windows

Пікірлер: 104

  • @davidbombal
    @davidbombal11 ай бұрын

    Learn Buffer Overflows from one of the masters - Stephen Sims - SANS instructor, course developer and well known reverse engineer with over 20 years of experience! Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: brilliant.org/DavidBombal // A bit about Stephen // Stephen is an industry expert with over 20 years of experience in information technology and security. He's authored SANS most advanced course, SEC760: Advanced Exploit Development for Penetration Testers, was the 9th person in the world to earn the GIAC Security Expert certification (GSE), and co-author of the Gray Hat Hacking book series, as well as a keynote speaker who's appeared at RSA USA and APJ, OWASP AppSec, BSides events and more. On top of all this, Stephen is Curriculum Lead for SANS Offensive Operations. // Stephen's Social // Twitter: twitter.com/Steph3nSims KZread Live: www.youtube.com/@OffByOneSecurity/streams KZread videos: www.youtube.com/@OffByOneSecurity/videos E-mail: Stephen(at)deadlisting.com SANS: www.sans.org/profiles/stephen-sims/ // Stephen's Book // Grey Hat Hacking: amzn.to/3B1FeIK // David's Social // Discord: discord.gg/davidbombal X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // Menu // 00:00 - Buffer overflows 00:50 - Sponsor 01:36 - Stephen Sims introduction 03:21 - Overview of buffer overflows 04:44 - Future of buffer overflows 09:17 - C program demo 14:14 - strcopy vulnerability 14:45 - Shell code role 18:45 - Rust vs C? 20:05 - Rust vs other languages 21:23 - Heap & stack memory 26:32 - SigRed vulnerability 29:02 - DNS query role 30:49 - Heap overflow cause 35:00 - No args program check 37:06 - Program overview 41:10 - Hex & Stack 42:29 - Buffer overflow demo 42:53 - Determining buffer size 45:03 - Authentication bypass 50:33 - ASLR & Exploitation 52:01 - Memory & Environment buffer buffer overflow buffer overflow attack windows linux exploits Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

  • @BlackUfo0_0

    @BlackUfo0_0

    11 ай бұрын

    Thank you, David, for these very useful videos for us. I wish you would have another channel in which the videos would be dubbed into Arabic so that they would benefit the Arab community. Thank you once again. ❤❤

  • @adeniranm7647
    @adeniranm764711 ай бұрын

    I always love when Stephen Sims is on. He's such a great teacher. Thanks!

  • @giwrgospavlidis8782
    @giwrgospavlidis878211 ай бұрын

    I was hoping for so long for you to bring Stephen again on your show David, you're both amazing! Thank you!! Please bring him again if possible

  • @Alain9-1
    @Alain9-111 ай бұрын

    I'm in love with those long tutorial and demo, thank you David & Steph

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Glad you like them!

  • @slimre4p3r
    @slimre4p3r11 ай бұрын

    David thank you so much for this video!! As someone passionately interested in exploit development, this information is invaluable!! Thank you

  • @scottspa74
    @scottspa7411 ай бұрын

    That was just genius, masterclass-level stuff. I will be watching this many times. In my final quarter at Uni I had a malware analysis class where whe dug into the registers, the stack frame, instruction pointers, the PE header, and using olly debug to RE some malware was the Final. I did great, but one quarter was not enough lol. Not nearly. A lot of this was familiar, but reinvigorated my curiosity. This dude is clearly an absolutely incredible instructor. Looking forward to the re-watches of this one. !

  • @philfoulup

    @philfoulup

    5 ай бұрын

    Yeah, Stephen Sims is the real deal. Guess that is why those Sans courses are big $ 😂 I knew I recognized the name; years ago I had some bootleg sans coursework in pdf and the exploit dev module (SANS 760 iirc) was written by him. Just recently discovered his KZread content and I’m excited. Very hard to find genuinely great intermediate to advanced tutorial knowledge. Feels like sometimes everything is geared toward beginners and once you get past the basics all other info is buried in a sea of “hello world” videos. Great to see quality teaching of more advanced topics in tech!

  • @C1t1z3n1
    @C1t1z3n111 ай бұрын

    Anytime I see Stephen I know we're in for a technical treat. His channel is fantastic for anyone who wants to get into the specifics of different types of attacks.

  • @tsunningwah3471

    @tsunningwah3471

    5 ай бұрын

    bbb

  • @criptovida
    @criptovida11 ай бұрын

    Pretty interesting content, buffer overflow is old school but never gets old. Thanks for sharing

  • @arijitdas9115
    @arijitdas911511 ай бұрын

    It's great to see that i was studying Buffer overflow and here is the video to understand Better. David you are doing right thing!

  • @tejasmarvel2023
    @tejasmarvel20233 ай бұрын

    these 2 have ocean of knowledge. It's a delight to watch this video. Thanks David and Stephen

  • @ariasm8911
    @ariasm891111 ай бұрын

    It is chef's kiss content, explanations were on point, thanks for bringing such a brilliant guest to your channel

  • @NeverGiveUpYo
    @NeverGiveUpYo11 ай бұрын

    Sims is a legend. Hope to see some reversing in the future.

  • @rationalbushcraft
    @rationalbushcraft11 ай бұрын

    Very cool. I have used Ghedria to do this but this is the first time I have seen it done with gef. This really helped with my understanding of these overflows. I understood the process but not really all the details. More like this please.

  • @camelotenglishtuition6394
    @camelotenglishtuition639411 ай бұрын

    Fantastic guest! Great video David, you're really outdoing yourself.

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Thank you! Glad you enjoyed it

  • @beratmlb
    @beratmlb7 ай бұрын

    Very informative video, I learned what I didn't know, let Stephen come again

  • @user-qo5kr4bd7u
    @user-qo5kr4bd7u11 ай бұрын

    You are the best person in this field. I am from Egypt and I love you very much because you are a fun person and your explanation is simple and easy.

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Very kind of you to say that :)

  • @Abduselam.m
    @Abduselam.m11 ай бұрын

    David Bombal your are amazing person who always helps people Big thanks

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Thank you! Helping people is really important :)

  • @kiruikiplangat3982
    @kiruikiplangat398211 ай бұрын

    Your doing a great job David. Thank the content.I did send you a messsege via your support mail.May you continue inspiring many.

  • @dreamscapeshomesolutions7888
    @dreamscapeshomesolutions788811 ай бұрын

    Great work including the programing!

  • @williamvickers6473
    @williamvickers647310 ай бұрын

    Amazing video! Thanks for sharing :) so interesting and great show and tell! Fascinating

  • @Goodwin454
    @Goodwin45411 ай бұрын

    I wish Stephen and Ocupy the web in one program that will be a hell of crazy fantastic. Thank you David .

  • @aryanraj9235
    @aryanraj923511 ай бұрын

    wow 😯😲 Amazing,so many topics got revised and learnt a lot ,thanks david for such content.

  • @gamereditor59ner22
    @gamereditor59ner2211 ай бұрын

    I finished linux basic foundation, ready to learn more for any Linux distribution commands BASH (kali, Ubuntu, Debian and more)!!

  • @jb-spaceworld2069
    @jb-spaceworld206911 ай бұрын

    Amazing! Pro stuff Stephen and David. Can Stephen return to this channel with some basic intros into Buffer overflow, the reverse shell, and all the cool stuff we've seen here? Or if you could share some pointers to his work in case this content already exists?

  • @roastedChick3n
    @roastedChick3n11 ай бұрын

    I love how you collab with other content creators, more content like this🤜🏻

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Thank you! Glad you enjoy it! It's great to collaborate with others as no one can know everything.

  • @SamDsk
    @SamDsk9 ай бұрын

    Great video! more technical videos like this pls.

  • @a.o.3523
    @a.o.352310 ай бұрын

    Excellent video! Thank you!

  • @freethink3r
    @freethink3r11 ай бұрын

    This is excellent! Thanks

  • @majiddehbi9186
    @majiddehbi918611 ай бұрын

    Woo MrBombla it looks like it's inevitable for the futur n egeneers to learn coding thx for that

  • @bnk28zfp
    @bnk28zfp10 ай бұрын

    Thank you David for good tontent!

  • @jayodyamethmal2651
    @jayodyamethmal26512 ай бұрын

    what an amazing explanation thank you for the content

  • @Iicence
    @Iicence11 ай бұрын

    love ur work man trust me

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Thank you! I appreciate that!

  • @BogdanDolia
    @BogdanDolia11 ай бұрын

    Excellent!

  • @savagepro9060
    @savagepro906011 ай бұрын

    'Buffer, The Vampire's Layer'

  • @davidbombal

    @davidbombal

    11 ай бұрын

    lol

  • @PrisonPlanett
    @PrisonPlanett10 ай бұрын

    been wanting to get taught this since i didnt in university business IT degree... lol thanks highest education tube

  • @moosematrix
    @moosematrix11 ай бұрын

    This has to be one of my favorite vidoes so far from you @davidBombal PLEASE MAKE MORE EXPLORING IN DEPTH BoF!!

  • @Paul_I_S
    @Paul_I_S11 ай бұрын

    Smashing the stack... Buffer overflow still with us? I guess I shouldn't be surprised.

  • @yettsy
    @yettsy11 ай бұрын

    Thanks for this tutorial 28:36

  • @data_eng_tuts
    @data_eng_tuts11 ай бұрын

    simply awesome 🔥💥

  • @garvey6302
    @garvey630211 ай бұрын

    If I want to get into pen Testing is it better to get a SOC or help desk position first or just start pen Testing?

  • @shaundesmond8005
    @shaundesmond800511 ай бұрын

    I remember demonstrating a buffer overflow in my University course back in 2007. I demonstrated a buffer overflow in a Microsoft Access by opening the CD Drive when you opened a malformed Microsoft Access file. Are buffer overflows still relevant today?

  • @johnnywilliams2641
    @johnnywilliams264111 ай бұрын

    one of the best fucking things I've seen on youtube.

  • @onaecO
    @onaecO5 ай бұрын

    amazing

  • @ayoubachak2154
    @ayoubachak215411 ай бұрын

    Hey David I've been a subscriber for a while now, and I loved your content since the beginning, I noticed that you've done a video about scripting in python using the telnet lib and gns3, I'm currently on a remote internship ( Network/ Software ), the task requires a connection to the cisco router or switch so I implemented a solution using telnetlib, but I need now to implement a serial connection which got me stuck because I've been searching for a way to emulate the serial communication ( we usually do in putty when connecting the router with the console cable ) between a python script from my computer and the emulated device in gns3. I would appreciate any help

  • @alex595659
    @alex5956597 ай бұрын

    for heap overflow ? could you explain please ?or , is it the same principe ?

  • @shazzz_land
    @shazzz_land4 ай бұрын

    are all these things that you all present possible on new cisco systems, palo alto systems etc, since you made an emphasys on cisco firewall being a massive box?

  • @user-uz4ti5zs8z
    @user-uz4ti5zs8z11 ай бұрын

    I like stuff like this! Linux is BOMB if it were'nt MS would not include cgwin into powershell

  • @cbb3062
    @cbb306211 ай бұрын

    Is it important to know low level languages such as assembly code and the x86 something he mentioned in the sig red example in modern times my teach said its old languages and dont matter but i feel likes hes wrong?

  • @CTimmerman
    @CTimmerman11 ай бұрын

    So instead of making the stack pointer only writable to control statements, you mark data as not executable, so when due to lack of bounds checking the stack pointer is overwritten, it's not executable, which it wasn't in the first place, so execution resumes with your data, which can't be executed due to DEP, so use the executable heap memory instead of the stack and poorly-written code to overwrite the heap pointer with a known function and your choice of parameter such as a path to an executable into a popen.

  • @whosonedphone
    @whosonedphone11 ай бұрын

    I always wondered about the differences between C and C##.

  • @Chavecito
    @Chavecito9 ай бұрын

    David, can you make a video explaining how memories work? Stephen references always to memory addresses but what is that?

  • @solpex
    @solpex11 ай бұрын

    david tell him to zoom in on his screen on his youtube we cant see the commands he types or anything great video by the way

  • @SeekerStudiosOfficial
    @SeekerStudiosOfficial11 ай бұрын

    Feel free to correct me if I'm wrong, but couldn't this be used to jailbreak an iPhone? obviously not by itself, but as a way of obtaining escalated privileges

  • @N7Null
    @N7Null11 ай бұрын

    14:10 Couldn't the developer include a guard clause in the function that throws an error in the event that the input being passed exceeds the buffer size?

  • @shaaficihussein1678
    @shaaficihussein167811 ай бұрын

    David could you kindly share the best courses on linux and database administrator..

  • @SunsetGraffiti
    @SunsetGraffiti9 ай бұрын

    1. I may have learned more from watching things NOT go according to plan than I would have if everything went smoothly. 2. I have a deep love for anything command line, so watching Sims run through some live command line exploits was like... *muah~*.

  • @blackhat5133
    @blackhat513311 ай бұрын

    ❤❤

  • @guyincognito9009
    @guyincognito900911 ай бұрын

    More Of This exploitation. Very very good video

  • @FreePizza007
    @FreePizza00711 ай бұрын

    53:39 core memory dump would have saved everything including env vars. Then look at the dump right?

  • @Wu8mylunch
    @Wu8mylunch7 ай бұрын

    thanksforthehelp

  • @my_imagination999
    @my_imagination99911 ай бұрын

  • @gwailou9003
    @gwailou90039 ай бұрын

    Would have been good to understand how a buffer and return pointers etc should work normally, before jumping straight into an overflow

  • @audaciousifti
    @audaciousifti11 ай бұрын

    I always wondered just how buffer overflows worked

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Stephen does an amazing job both explaining the theory and practically demonstrating this :)

  • @lumikarhu

    @lumikarhu

    11 ай бұрын

    bro i first stumbled upon tutorials about buffer overflows when i was a kid sometime in late 90s. It was explained in every possible way ever since because it's like a gateway to reverse engineering. And I was late to the party already, when I started being 8 years old, people already were presenting tutorials about buffer, stack and heap overflows in popular applications and teaching making exploits. Where's the rock you've been living under? Don't underestimate your abilities to google. You can learn everything by googling. David is nice at explaining things but do your homework on your own once in a while if you ever wanna learn anything, you'll thank me later. Good luck!

  • @guilherme5094
    @guilherme509411 ай бұрын

    👍👍!

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Thank you!

  • @user-qo5kr4bd7u
    @user-qo5kr4bd7u11 ай бұрын

    Deved good

  • @angrybirds2472
    @angrybirds2472Ай бұрын

    you wrote that bot for tibia?!

  • @carsonjamesiv2512
    @carsonjamesiv251211 ай бұрын

    😎👍

  • @mrpotato8985
    @mrpotato898511 ай бұрын

    And where is that "link below"?

  • @AjayKumar-yl4fx
    @AjayKumar-yl4fx11 ай бұрын

    Buffer overflow exploit

  • @rami.0092
    @rami.009211 ай бұрын

    🎉👍🏻

  • @abelwafula4178
    @abelwafula417811 ай бұрын

    I'm from Kenya can you teach me ethical hacking please

  • @user-gp3ke6fd6p
    @user-gp3ke6fd6p11 ай бұрын

    Sir need your help I want to scam back scamer

  • @alarmsquadnj
    @alarmsquadnj11 ай бұрын

    ❤❤❤❤❤🎉

  • @PirateSimulator
    @PirateSimulator11 ай бұрын

    Third

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Thank you for watching!

  • @PirateSimulator

    @PirateSimulator

    11 ай бұрын

    @@davidbombal UR MY FAV KZreadR AND YOU COMMENTED FOR THE FIRST TIME😭😭😭

  • @PirateSimulator

    @PirateSimulator

    11 ай бұрын

    @@davidbombal I LOVE YOU

  • @chicswag4657
    @chicswag465710 ай бұрын

    Rare wubbox

  • @sumitsingh-fj6sj
    @sumitsingh-fj6sj11 ай бұрын

    first

  • @davidbombal

    @davidbombal

    11 ай бұрын

    Thank you for your support!

  • @United_states_of_America9
    @United_states_of_America911 ай бұрын

    I have answer . How to fix kali linux network problem it says ( network manager not running ) plss help me ❤

  • @sumitsingh-fj6sj
    @sumitsingh-fj6sj11 ай бұрын

    i am first pin pls

  • @davidbombal

    @davidbombal

    11 ай бұрын

    I pin my comment to help people find the relevant information.

  • @eyesoffloraandfauna8728
    @eyesoffloraandfauna872811 ай бұрын

    WiFi is not showing in parrot os ?? Any sol.

  • @kingstunnel
    @kingstunnel11 ай бұрын

    give him reminder to ON his ASLR

  • @WAFEYYQQ
    @WAFEYYQQ11 ай бұрын

    Hi @davidbombal what laptop do you have and where can I get one window 11

  • @WAFEYYQQ

    @WAFEYYQQ

    11 ай бұрын

    Also btw your videos are jam packed with education and the best ! And it’s a breeze to understand

  • @wobblynl1742
    @wobblynl174211 ай бұрын

    Tried to replicate but gets is removed, only fgets works (nvm it still makes a vuln file, just a warning)