@@ -4,21 +4,21 @@ Step-by-step stack-based exploitation techniques. This information aims at helpi
4
4
Binary exploitation (PWN) tutorials to help you understand the foundations of stack-based exploitation techniques.
5
5
6
6
* Basic Concepts:
7
- * **Endianness** https://www.youtube.com/embed/ T8E_JRqN0fY
8
- * **Global Offset Table (GOT) and Procedure Linkage Table (PLT)** https://www.youtube.com/embed/ B4-wVdQo040
9
- * **How to debug the exploit** https://www.youtube.com/embed/ CWxDhp0OFzI
7
+ * **Endianness** https://www.youtube.com/watch?v= T8E_JRqN0fY
8
+ * **Global Offset Table (GOT) and Procedure Linkage Table (PLT)** https://www.youtube.com/watch?v= B4-wVdQo040
9
+ * **How to debug the exploit** https://www.youtube.com/watch?v= CWxDhp0OFzI
10
10
* Exploitation Techniques:
11
- * **Buffer Overflow Foundations** https://www.youtube.com/embed/ 0_merdYty4Y
12
- * **Buffer Overflow to overwrite memory with arbitrary values** https://www.youtube.com/embed/ DiyFDCuyPqg
13
- * **Execution Flow Hijacking (ret2win)** https://www.youtube.com/embed/ -VUtXwDm5yQ
14
- * **Shellcode Execution (ret2shellcode)** https://www.youtube.com/embed/ 6Yiupj3XHrM
15
- * **Integer Overflow / Underflow** https://www.youtube.com/embed/ Mfaq4PW8H1I
16
- * **Format String** https://www.youtube.com/embed/ 0-ulL3Y0MS8
17
- * **PIE and Canary Bypass** https://www.youtube.com/embed/ FpKL2cAlJbM
18
- * **GOT overwrite** https://www.youtube.com/embed/ 9SWYvhY5dYw
19
- * **Return Oriented Programming (ROP)** https://www.youtube.com/embed/ 8zRoMAkGYQE
20
- * **Return to Libc (ret2libc)** https://www.youtube.com/embed/ TTCz3kMutSs
21
- * **Making stack executable with malicious mprotect call** https://www.youtube.com/embed/ r_tysAKIELs
11
+ * **Buffer Overflow Foundations** https://www.youtube.com/watch?v= 0_merdYty4Y
12
+ * **Buffer Overflow to overwrite memory with arbitrary values** https://www.youtube.com/watch?v= DiyFDCuyPqg
13
+ * **Execution Flow Hijacking (ret2win)** https://www.youtube.com/watch?v= -VUtXwDm5yQ
14
+ * **Shellcode Execution (ret2shellcode)** https://www.youtube.com/watch?v= 6Yiupj3XHrM
15
+ * **Integer Overflow / Underflow** https://www.youtube.com/watch?v= Mfaq4PW8H1I
16
+ * **Format String** https://www.youtube.com/watch?v= 0-ulL3Y0MS8
17
+ * **PIE and Canary Bypass** https://www.youtube.com/watch?v= FpKL2cAlJbM
18
+ * **GOT overwrite** https://www.youtube.com/watch?v= 9SWYvhY5dYw
19
+ * **Return Oriented Programming (ROP)** https://www.youtube.com/watch?v= 8zRoMAkGYQE
20
+ * **Return to Libc (ret2libc)** https://www.youtube.com/watch?v= TTCz3kMutSs
21
+ * **Making stack executable with malicious mprotect call** https://www.youtube.com/watch?v= r_tysAKIELs
22
22
* **Advanced Format String**
23
23
* **vfprintf internal buffer** https://www.youtube.com/watch?v=K690__BET10
24
24
* **Abusing %s and %n** https://www.youtube.com/watch?v=FF8SRxMP8Bc
0 commit comments