OSCP Prep - x86 Windows Stack-Based Buffer Overflow Full Tutorial - War-FTP 1.65
Published 1 year ago
Twitch: https://twitch.tv/alh4zr3d
Twitter: https://twitter.com/alh4zr3d
Discord: https://discord.gg/3kTQYxtGwR
All of the strange aeons of stack-based buffer overflow fundamentals entirely de-obfuscated! This video contains every shred of information required to get you through a rudimentary x86 buffer overflow in Windows--such as that encountered on the Offensive Security Certified Professional (OSCP) exam--plus a little extra!
0:00 Introduction
7:50 Intro to Exploit Development/CPU Architecture
23:05 x86 Assembly Primer
36:43 Win32 Process Memory
53:26 The Stack and smashing it
1:04:15 Beginning of practical demo
1:06:35 Running WarFTP and attaching the debugger
1:10:10 Vulnerability discovery
1:26:20 Building a simple python fuzzer/analyzing vuln
1:44:00 Determining offset of return address overwrite
1:56:23 Determining bad characters
2:21:35 Finding a suitable "JMP ESP" address for the overwrite
2:36:32 Generating reverse shell shellcode with msfvenom
2:45:04 Shellcode crashes; explaining keeping ESP and EIP separate for FNSTENV
2:59:50 Rev shell from return address overwrite/showing shellcode execution in debugger
3:05:58 We aren't done! Analyzing another vuln in the same program
3:11:20 Intro to the Structured Exception Handler
3:18:50 Analyzing SEH overwrite and determining offset
3:29:10 Explaining POP-POP-RET and finding a suitable address
3:40:50 Executing a short JMP to get to our larger buffer
3:47:45 Generating shellcode, watching the payload execute in memory, gaining rev shell
In this video, I exploit a piece of real-world software with a known stack-based buffer overflow vulnerability: WarFTP 1.65. See Exploit-DB page here: https://www.exploit-db.com/exploits/3570. Both a return address overwrite and an SEH overwrite are exploited!
The entire process of exploit development is explained in detail, starting with vulnerability discovery and fuzzing and ending with TWO fully functional exploits in Python.
Note that this is cut from a VOD of my Twitch stream, so at times I seem to be randomly out of breath because Twitch chat makes me do exercises while hacking.
-
Category
People & Blogs
-
Debug
0
-
63:04 Basic Buffer Overflow - VulnServer TRUN by John Hammond 158,277 views
-
168:24 How to PASS the OSCP Exam - You're probably not preparing like you should be! by Alh4zr3d 25,872 views
-
17:30 Running a Buffer Overflow Attack - Computerphile by Computerphile 1,803,675 views
-
15:09 Mouse Cursor History (and why I made my own) by Posy 1,054,873 views
-
93:51 FAA Part 107 Study Guide: Drone Certification - Pass First Try! by Altitude University 217,432 views
-
16:27 !!STOP!! - Why Are Windows Blue Screens Blue? Find out! by Dave's Garage 361,489 views
-
42:46 How the Best Hackers Learn Their Craft by RSA Conference 1,910,065 views
-
103:21 Buffer Overflows Made Easy (2022 Edition) by The Cyber Mentor 45,868 views
-
19:35 OSCP Exam Review - Don't Let Failure Discourage You by Infinite Logins 1,527 views
-
63:43 How to Speak by MIT OpenCourseWare 9,311,550 views
-
33:29 Understanding Static, Stack, and Heap Memory Regions (Examples in C) by Jonathan Muckell 16,730 views
-
34:28 Deserialization: what, how and why [not] - Alexei Kojenov - AppSecUSA 2018 by OWASP Foundation 9,057 views
-
184:32 Fresh Garden 🌿 - Lofi beats for your life - Cat lofi - Cute Beats by Lofi for Life 123,974 views
-
16:13 Global variable Buffer Overflow to leak memory - 34C3 CTF readme_revenge (pwn) by LiveOverflow 80,321 views
-
13:13 Identifying Exploits Quickly for the OSCP exam by Andy Li 4,580 views
-
61:12 Windows and Linux Privilege Escalation - OSCP 2020 by Motasem Hamdan 23,808 views
-
202:45 Swift Programming Tutorial for Beginners (Full Tutorial) by CodeWithChris 5,186,436 views
-
58:22 Stack Based Buffer Overflow Prep by Tib3rius 18,282 views
-
173:52 Chill Drive - Aesthetic Music ~ Lofi hip hop mix by chilli music 667,010 views
-
13:45 Buffer Overflow for the OSCP Exam by Andy Li 3,321 views