TryHackMe! Buffer Overflow & Penetration Testing

77,398
0
Published 2020-05-19

All Comments (21)
  • @Ropex
    Lord Pingu didn't deserve his name to be slandered >:(
  • @stevecooper3574
    That room is a fantastic walkthrough for simple buffer overflows. Great job on the vid and to the room creator!
  • @ChamplooMusashi
    Happy to see a video on the whole process of executing a buffer overflow exploit. Helps from the programming side to understand more of what needs to be done to make code more secure (evil strings!)
  • You are just amazing. Thank you for making such worthful videos. I'm learning so much, everyday, just lookin' at your tutorials. God bless you John
  • @davidfox4253
    Thanks for that great walk thru and the "Think allowed" approach!! Cheers
  • @bluefloyd9058
    "noot noot!". That penguin is from a kids show I used to watch here in NZ called pingu.
  • @crump404
    This is a brilliant room John also a brilliant video. Thanks.
  • @TataruTaru
    This is one of the first I've seen where we actually fills in the readme. Most of them, he makes the readme, and never goes back to it :)
  • @neilthomas5026
    very cool vid as always :) , and cant wait to work on your room :)
  • @mi2has
    buffer overflow part is great
  • @KaLata123456
    Hey John-love your videos , keep it up. On this particular video when you perform the netcat for reverseshell you use 2 commands on the your attacking machine to connect to the victim besides setting up the listener (nc -lnvp 12789). Those 2 commands are nc_reverseshell.sh and nc_stabilize.sh. Can you explain where do you get those executables and how they apply to this use case. Thanks