Just a test VLOG. I released it for Patrons and YouTube Members first, and then asked them if I should make it public. The majority said yes, so here it is. -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Another PwnAdventure episode. We are very close to a fly hack! But this time I got some help with creating a .dll for a DLL injection. And then we can use the pointer paths we have found last video, to read the player position from the Pwn Adventure 3 game process. π΄ PwnAdventure Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG GuidedHacking: https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw Stephen Chapman: https://www.youtube.com/channel/UCqfqH-wq12WOm4QG4KiRisw Stackexchange: https://reverseengineering.stackexchange.com/questions/18144/need-help-with-reverse-engineering-camera-related-information-in-a-video-game/18178#18178 -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
We continue doing some Cheat Engine work to find the player's position and camera position. This will help us to implement a fly hack in a future episode. blog: https://liveoverflow.com/player-and-camera-position-for-fly-hack-pwn-adventure-3-2/ playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
We continue our journey in Windows Game hacking with Pwn Adventure 3, by looking at Pointer Scans from Cheat Engine. And surprisingly the same techniques are being used by speedrunners to implement automatic time splitters. π΄ Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG Pwn Adventure 3: https://www.pwnadventure.com/ glurmo's speedrun: https://www.youtube.com/watch?v=_5DUdCYv0pU -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
We are going to learn basic game hacking on Windows with Cheat Engine and Ghidra. Pwn Adventure 3 Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG blog: https://liveoverflow.com/getting-started-with-windows-game-hacking-pwn-adventure-3/ -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Solving the Minetest Hardware Challenge from the Google CTF 2019 Qualifier. * Google CTF: https://capturetheflag.withgoogle.com * Solution Script: https://gist.github.com/LiveOverflow/1480ee7e1ffead942063c638d5b66804 * blog: https://liveoverflow.com/minetest/ -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
We are finally achieving arbitrary read/write and talk about the various possibilities we have now. blog: https://liveoverflow.com/preparing-for-stage-2-of-a-webkit-exploit-browser-0x07-2/ -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Part 7: In this video we use the stage 1 fakeobj() and addrof() primitives, to craft malicious objects that allow us to implement arbitrary memory read and write. saelo's phrack paper: http://www.phrack.org/papers/attacking_javascript_engines.html niklasb's exploit: https://github.com/niklasb/sploits/blob/master/safari/regexp-uxss.html -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation
Simple buffer overflow speedrun challenge, exploited with a ROP chain generated by Ropper. And analyse the timeline. blog: https://liveoverflow.com/speedrun-hacking-buffer-overflow-speedrun-001-dc27-2/ -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Bonus Video: https://www.youtube.com/watch?v=PJJKvupvU4Q -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Part 6: There are still many things I haven't explained yet. So in this video we go over the boxed vs. unboxed values, how to convert Integer addresses to Doubles and why our bug is a memory corruption. blog: https://liveoverflow.com/revisiting-javascriptcore-internals-boxed-vs-unboxed-browser-0x06/ test.js: https://gist.github.com/LiveOverflow/71bcf3f364c9719998bf159923310019 The Exploit:https://github.com/LinusHenze/WebKit-RegEx-Exploit Playlist: https://www.youtube.com/watch?v=5tEdSoZ3mmE&list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t -=[ π΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon: https://typhooncon.com/ Challenge: https://typhooncon.com/typhooncon-challenge-2019/ -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
The pretty paste solution! Livestream about going through the solution for the web challenge pastetastic. We learn about DOM clobbering, absuing Chrome's XSS auditor and how the same-origin applies to iframes. Twitch: https://twitch.tv/liveoverflow LiveOverflow2: https://www.youtube.com/channel/UCNNfzr9A5dEOscVEDyyzo-A Full Stream: https://www.youtube.com/watch?v=c4ewF9bhJuU -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Part5: In this video we turn the bug used in addrof() to corrupt the memory of internal JavaScriptCore Objects which can help us to compromise the engine. The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit Saelo's exploit: https://github.com/saelo/cve-2018-4233/blob/master/pwn.js Saelo's phrack paper: http://www.phrack.org/papers/attacking_javascript_engines.html -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation
Join me on Twitch: https://twitch.tv/liveoverflow LiveOverflow2: https://www.youtube.com/channel/UCNNfzr9A5dEOscVEDyyzo-A -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Part 4: We finally look at the actual exploit code. We start by understanding the addrof() primitive used to leak the address of a JavaScript object in memory. test.js: https://gist.github.com/LiveOverflow/ee5fb772334ec985094f77c91be60492 Crash investigation: https://webkit.org/blog/6411/javascriptcore-csi-a-crash-site-investigation-story/ The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit The Fix: https://github.com/WebKit/webkit/commit/7cf9d2911af9f255e0301ea16604c9fa4af340e2?diff=split#diff-fb5fbac6e9d7542468cfeed930e241c0L66 Saelo's exploit: https://github.com/saelo/cve-2018-4233/blob/master/pwn.js Playlist: https://www.youtube.com/watch?v=5tEdSoZ3mmE&list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t -=[ π΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon: https://typhooncon.com/ -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #browserexploitation
Part 3: Introducing the JavaScript interpreter, DFG JIT and FTL JIT from WebKit in this third part. To do that we use the debug version of JSC again and use environment variables to print useful debug output. Crash investigation: https://webkit.org/blog/6411/javascriptcore-csi-a-crash-site-investigation-story/ ZDI: https://www.thezdi.com/blog/2018/4/12/inverting-your-assumptions-a-guide-to-jit-comparisons Playlist: https://www.youtube.com/watch?v=5tEdSoZ3mmE&list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t -=[ π΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/ -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Let's have a look at how JavaScriptCore implements JavaScript Objects and values like integers and floats. We can use lldb to look into the memory. Phrack: http://phrack.org/papers/attacking_javascript_engines.html The Linus: https://twitter.com/linushenze The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit The Fix: https://bugs.webkit.org/show_bug.cgi?id=191731 -=[ π΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/ -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation
Part 1: We are going to try out Linus's exploit and setup a vulnerable WebKit version including debug symbols. The Linus: https://twitter.com/linushenze The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit The Vulnerable Commit: 3af5ce129e6636350a887d01237a65c2fce77823 The Fix: https://bugs.webkit.org/show_bug.cgi?id=191731 saelo's german presentation: https://www.youtube.com/watch?v=1RLt7yscBZc -=[ π΄οΈ Advertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/ -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation
The start of a new series. We will try to learn some basics about Browser Exploitation. blog: https://liveoverflow.com/getting-into-browser-exploitation-new-series-introduction-browser-0x00/ -=[ π΄οΈAdvertisement ]=- This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/ Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/ -=[ ποΈ References ]=- Linus's Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit Niklas's Exploit: https://github.com/niklasb/sploits/blob/master/safari/regexp-uxss.html ZDI's Blog: https://www.zerodayinitiative.com/blog/2019/3/14/the-apple-bug-that-fell-near-the-webkit-tree Saelo's german class: https://www.youtube.com/watch?v=1RLt7yscBZc Saelo's Attacking JavaScript Engines: http://www.phrack.org/papers/attacking_javascript_engines.html ret2system's blog: http://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/ -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BrowserExploitation
Where does the term "script kiddie" come from? Who said it first? Let's do some hacker history research! blog: https://liveoverflow.com/the-origin-of-script-kiddie-hacker-etymology/ r00t crongrab: http://www.r00t.org/advisories/r00t.advisory.97.crongrab.html H2K2 (2002): "The Conscience of a Hacker" https://www.youtube.com/watch?v=0tEnnvZbYek YABBS hack: http://textfiles.com/messages/YABBS/hack Prack: http://www.phrack.org/ Textfiles: http://textfiles.com/ -=[ π΄ Stuff I use ]=- β Microphone:* https://amzn.to/2LW6ldx β Graphics tablet:* https://amzn.to/2C8djYj β Camera#1 for streaming:* https://amzn.to/2SJ66VM β Lens for streaming:* https://amzn.to/2CdG31I β Connect Camera#1 to PC:* https://amzn.to/2VDRhWj β Camera#2 for electronics:* https://amzn.to/2LWxehv β Lens for macro shots:* https://amzn.to/2C5tXrw β Keyboard:* https://amzn.to/2LZgCFD β Headphones:* https://amzn.to/2M2KhxW -=[ β€οΈ Support ]=- β per Video: https://www.patreon.com/join/liveoverflow β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ π Social ]=- β Twitter: https://twitter.com/LiveOverflow/ β Website: https://liveoverflow.com/ β Subreddit: https://www.reddit.com/r/LiveOverflow/ β Facebook: https://www.facebook.com/LiveOverflow/ -=[ π P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.