In this video , i reverse-engineered a windows executable and found bufferoverflow and exploited it on a Linux machine .
Link to the tryhackme room:-https://tryhackme.com/room/brainpan
If u didn't understand bufferoverflow from my video or u don't have a basic understanding of Bufferoverflows I recommend watching TCM's Bufferoverflow made easy series.
There are a couple of mistakes in this video:-
1) at 26.30 , that return address is for EIP because it is of 4 bytes, not for esp(stackpointer) .
2) at 37.19 , there is nothing wrong with the output . (where [action] is one of :-
network
proclist
manual [command] )
As u can see that it is asking for a command after manual. So , the output is fine.
Follow me:-
Medium:-https://anikatesawhney549.medium.com/
Twitter:-https://twitter.com/AnikateSawhney