LiveOverflow

just a wannabe hacker... -=[ ❀️ Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany

Test VLOG / Channel Updates / Building PC - loopback 0x05

Just a test VLOG. I released it for Patrons and YouTube Members first, and then asked them if I should make it public. The majority said yes, so here it is. -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

11-02
10:57

Reading Player Position with DLL Injection - Pwn Adventure 3

Another PwnAdventure episode. We are very close to a fly hack! But this time I got some help with creating a .dll for a DLL injection. And then we can use the pointer paths we have found last video, to read the player position from the Pwn Adventure 3 game process. 🌴 PwnAdventure Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG GuidedHacking: https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw Stephen Chapman: https://www.youtube.com/channel/UCqfqH-wq12WOm4QG4KiRisw Stackexchange: https://reverseengineering.stackexchange.com/questions/18144/need-help-with-reverse-engineering-camera-related-information-in-a-video-game/18178#18178 -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

10-30
10:06

Finding Player and Camera Position for Fly Hack - Pwn Adventure 3

We continue doing some Cheat Engine work to find the player's position and camera position. This will help us to implement a fly hack in a future episode. blog: https://liveoverflow.com/player-and-camera-position-for-fly-hack-pwn-adventure-3-2/ playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

09-13
10:54

How Speedrunners Use Game Hacking Tools

We continue our journey in Windows Game hacking with Pwn Adventure 3, by looking at Pointer Scans from Cheat Engine. And surprisingly the same techniques are being used by speedrunners to implement automatic time splitters. 🌴 Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG Pwn Adventure 3: https://www.pwnadventure.com/ glurmo's speedrun: https://www.youtube.com/watch?v=_5DUdCYv0pU -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

08-20
12:01

Windows Game Hacking with Ghidra and Cheat Engine

We are going to learn basic game hacking on Windows with Cheat Engine and Ghidra. Pwn Adventure 3 Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG blog: https://liveoverflow.com/getting-started-with-windows-game-hacking-pwn-adventure-3/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

08-04
15:32

Minetest Circuit Challenge - Google CTF 2019 Qualifier

Solving the Minetest Hardware Challenge from the Google CTF 2019 Qualifier. * Google CTF: https://capturetheflag.withgoogle.com * Solution Script: https://gist.github.com/LiveOverflow/1480ee7e1ffead942063c638d5b66804 * blog: https://liveoverflow.com/minetest/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

07-28
13:52

Arbitrary Read and Write in WebKit Exploit

We are finally achieving arbitrary read/write and talk about the various possibilities we have now. blog: https://liveoverflow.com/preparing-for-stage-2-of-a-webkit-exploit-browser-0x07-2/ -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

07-21
09:40

Preparing for Stage 2 of a WebKit exploit

Part 7: In this video we use the stage 1 fakeobj() and addrof() primitives, to craft malicious objects that allow us to implement arbitrary memory read and write. saelo's phrack paper: http://www.phrack.org/papers/attacking_javascript_engines.html niklasb's exploit: https://github.com/niklasb/sploits/blob/master/safari/regexp-uxss.html -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation

07-14
14:32

Speedrun Hacking Buffer Overflow - speedrun-001 DC27

Simple buffer overflow speedrun challenge, exploited with a ROP chain generated by Ropper. And analyse the timeline. blog: https://liveoverflow.com/speedrun-hacking-buffer-overflow-speedrun-001-dc27-2/ -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

07-07
10:57

YouTube BANNING Hacking Videos - Hot Take

Bonus Video: https://www.youtube.com/watch?v=PJJKvupvU4Q -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

07-04
22:23

Revisiting JavaScriptCore Internals: boxed vs. unboxed

Part 6: There are still many things I haven't explained yet. So in this video we go over the boxed vs. unboxed values, how to convert Integer addresses to Doubles and why our bug is a memory corruption. blog: https://liveoverflow.com/revisiting-javascriptcore-internals-boxed-vs-unboxed-browser-0x06/ test.js: https://gist.github.com/LiveOverflow/71bcf3f364c9719998bf159923310019 The Exploit:https://github.com/LinusHenze/WebKit-RegEx-Exploit Playlist: https://www.youtube.com/watch?v=5tEdSoZ3mmE&list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t -=[ πŸ•΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon: https://typhooncon.com/ Challenge: https://typhooncon.com/typhooncon-challenge-2019/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

06-30
08:59

Paste-Tastic! - Post Google CTF 2019 Stream

The pretty paste solution! Livestream about going through the solution for the web challenge pastetastic. We learn about DOM clobbering, absuing Chrome's XSS auditor and how the same-origin applies to iframes. Twitch: https://twitch.tv/liveoverflow LiveOverflow2: https://www.youtube.com/channel/UCNNfzr9A5dEOscVEDyyzo-A Full Stream: https://www.youtube.com/watch?v=c4ewF9bhJuU -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

06-26
01:04:41

The fakeobj() Primitive: Turning an Address Leak into a Memory Corruption

Part5: In this video we turn the bug used in addrof() to corrupt the memory of internal JavaScriptCore Objects which can help us to compromise the engine. The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit Saelo's exploit: https://github.com/saelo/cve-2018-4233/blob/master/pwn.js Saelo's phrack paper: http://www.phrack.org/papers/attacking_javascript_engines.html -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation

06-23
15:59

Building an 8-Bit Computer From Scratch

Join me on Twitch: https://twitch.tv/liveoverflow LiveOverflow2: https://www.youtube.com/channel/UCNNfzr9A5dEOscVEDyyzo-A -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

06-16
03:52

WebKit RegExp Exploit addrof() walk-through

Part 4: We finally look at the actual exploit code. We start by understanding the addrof() primitive used to leak the address of a JavaScript object in memory. test.js: https://gist.github.com/LiveOverflow/ee5fb772334ec985094f77c91be60492 Crash investigation: https://webkit.org/blog/6411/javascriptcore-csi-a-crash-site-investigation-story/ The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit The Fix: https://github.com/WebKit/webkit/commit/7cf9d2911af9f255e0301ea16604c9fa4af340e2?diff=split#diff-fb5fbac6e9d7542468cfeed930e241c0L66 Saelo's exploit: https://github.com/saelo/cve-2018-4233/blob/master/pwn.js Playlist: https://www.youtube.com/watch?v=5tEdSoZ3mmE&list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t -=[ πŸ•΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon: https://typhooncon.com/ -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #browserexploitation

06-16
13:31

Just-in-time Compiler in JavaScriptCore (WebKit)

Part 3: Introducing the JavaScript interpreter, DFG JIT and FTL JIT from WebKit in this third part. To do that we use the debug version of JSC again and use environment variables to print useful debug output. Crash investigation: https://webkit.org/blog/6411/javascriptcore-csi-a-crash-site-investigation-story/ ZDI: https://www.thezdi.com/blog/2018/4/12/inverting-your-assumptions-a-guide-to-jit-comparisons Playlist: https://www.youtube.com/watch?v=5tEdSoZ3mmE&list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t -=[ πŸ•΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/ -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

06-09
09:49

The Butterfly of JSObject - browser 0x02

Let's have a look at how JavaScriptCore implements JavaScript Objects and values like integers and floats. We can use lldb to look into the memory. Phrack: http://phrack.org/papers/attacking_javascript_engines.html The Linus: https://twitter.com/linushenze The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit The Fix: https://bugs.webkit.org/show_bug.cgi?id=191731 -=[ πŸ•΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation

06-02
10:56

Hacking Browsers - Setup and Debug JavaScriptCore / WebKit

Part 1: We are going to try out Linus's exploit and setup a vulnerable WebKit version including debug symbols. The Linus: https://twitter.com/linushenze The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit The Vulnerable Commit: 3af5ce129e6636350a887d01237a65c2fce77823 The Fix: https://bugs.webkit.org/show_bug.cgi?id=191731 saelo's german presentation: https://www.youtube.com/watch?v=1RLt7yscBZc -=[ πŸ•΄οΈ Advertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/ -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation

05-26
11:35

New Series: Getting Into Browser Exploitation - browser 0x00

The start of a new series. We will try to learn some basics about Browser Exploitation. blog: https://liveoverflow.com/getting-into-browser-exploitation-new-series-introduction-browser-0x00/ -=[ πŸ•΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/ -=[ πŸ—„οΈ References ]=- Linus's Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit Niklas's Exploit: https://github.com/niklasb/sploits/blob/master/safari/regexp-uxss.html ZDI's Blog: https://www.zerodayinitiative.com/blog/2019/3/14/the-apple-bug-that-fell-near-the-webkit-tree Saelo's german class: https://www.youtube.com/watch?v=1RLt7yscBZc Saelo's Attacking JavaScript Engines: http://www.phrack.org/papers/attacking_javascript_engines.html ret2system's blog: http://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/ -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation

05-19
09:46

The Origin of Script Kiddie - Hacker Etymology

Where does the term "script kiddie" come from? Who said it first? Let's do some hacker history research! blog: https://liveoverflow.com/the-origin-of-script-kiddie-hacker-etymology/ r00t crongrab: http://www.r00t.org/advisories/r00t.advisory.97.crongrab.html H2K2 (2002): "The Conscience of a Hacker" https://www.youtube.com/watch?v=0tEnnvZbYek YABBS hack: http://textfiles.com/messages/YABBS/hack Prack: http://www.phrack.org/ Textfiles: http://textfiles.com/ -=[ πŸ”΄ Stuff I use ]=- β†’ Microphone:* https://amzn.to/2LW6ldx β†’ Graphics tablet:* https://amzn.to/2C8djYj β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM β†’ Lens for streaming:* https://amzn.to/2CdG31I β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv β†’ Lens for macro shots:* https://amzn.to/2C5tXrw β†’ Keyboard:* https://amzn.to/2LZgCFD β†’ Headphones:* https://amzn.to/2M2KhxW -=[ ❀️ Support ]=- β†’ per Video: https://www.patreon.com/join/liveoverflow β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ πŸ• Social ]=- β†’ Twitter: https://twitter.com/LiveOverflow/ β†’ Website: https://liveoverflow.com/ β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ β†’ Facebook: https://www.facebook.com/LiveOverflow/ -=[ πŸ“„ P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

05-12
08:49

Recommend Channels