TryHackMe! Buffer Overflow & Penetration Testing
77,398
Published 2020-05-19
E-mail: [email protected]
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org/
Twitter: twitter.com/_johnhammond
All Comments (21)
-
Lord Pingu didn't deserve his name to be slandered >:(
-
That room is a fantastic walkthrough for simple buffer overflows. Great job on the vid and to the room creator!
-
"now we are papa"
-
Happy to see a video on the whole process of executing a buffer overflow exploit. Helps from the programming side to understand more of what needs to be done to make code more secure (evil strings!)
-
You are just amazing. Thank you for making such worthful videos. I'm learning so much, everyday, just lookin' at your tutorials. God bless you John
-
Thanks for that great walk thru and the "Think allowed" approach!! Cheers
-
"noot noot!". That penguin is from a kids show I used to watch here in NZ called pingu.
-
This is a brilliant room John also a brilliant video. Thanks.
-
This is one of the first I've seen where we actually fills in the readme. Most of them, he makes the readme, and never goes back to it :)
-
Cool man. Learning so much watching your videos
-
thank you for everything john!!!
-
Here we go, bring it up John :)
-
Thank you for another great video
-
This is pure gold for me!
-
Thats so awesome about the room u made congratulations
-
4:36 Lies, i screamed ^^
-
very cool vid as always :) , and cant wait to work on your room :)
-
buffer overflow part is great
-
Soo good!
-
Hey John-love your videos , keep it up. On this particular video when you perform the netcat for reverseshell you use 2 commands on the your attacking machine to connect to the victim besides setting up the listener (nc -lnvp 12789). Those 2 commands are nc_reverseshell.sh and nc_stabilize.sh. Can you explain where do you get those executables and how they apply to this use case. Thanks