Dominating 3 Buffer Overflows on a Single Machine

Dominating 3 Buffer Overflows on a Single Machine

During my journey, I encountered a host of vulnerabilities, including local file inclusion, log poisoning, and the ever-elusive buffer overflow. ?? The buffer overflow part, in particular, posed a challenge as it ventured into new territory for me. But you know what they say – the trickier the challenge, the more satisfying the victory! ??

Intrigued by the buffer overflow puzzle, I'm diving deeper into this realm, as I find it not only challenging but also incredibly enjoyable. ??

?? YouTube Link: https://youtu.be/PHrsHnd2c9E

I want to clarify that these videos serve as a personal challenge to practice even more, and they're not intended as tutorials. It's just a recap of my own approach to solving the machines.

#infosec #CyberSecurity #CertificationGoals #EthicalHacking #LearningJourney #infosec #elearnsecurity #offsec


要查看或添加评论,请登录

KEVIN VANEGAS的更多文章

  • LittlePivoting-Dockerlabs Walkthrough / WriteUp

    LittlePivoting-Dockerlabs Walkthrough / WriteUp

    Hello everyone, we continue exploring the Dockerlabs DockerLabs platform that I introduced in my previous video! This…

    5 条评论
  • AS-REP roasting with Crackmapexec/NetExec

    AS-REP roasting with Crackmapexec/NetExec

    This new Crackmapexec/NetExec series is a part of the Active Directory Lab series on my channel . With tools like…

  • Vulnerable Active Directory Lab

    Vulnerable Active Directory Lab

    I'm currently learning pentesting techniques for Active Directory, and I've been sharing my progress on YouTube. Today,…

  • Enumeration With BloodHound

    Enumeration With BloodHound

    As a cybersecurity student, I'm constantly seeking ways to expand my knowledge and skill set. Recently, I delved into…

  • Learning About DCSync Attacks in Active Directory

    Learning About DCSync Attacks in Active Directory

    I continued diving into exploitation techniques within Active Directory. Here are the key highlights: 1?? DCSync…

  • Set Up and Test ASREProast and Kerberoasting Attacks

    Set Up and Test ASREProast and Kerberoasting Attacks

    We create a small Active Directory lab using VirtualBox and a Windows Server Standard evaluation. We'll configure it to…

  • My notes on solving 'Return' from Hack The Box.

    My notes on solving 'Return' from Hack The Box.

    > The machine Key Concepts: Windows Remote Management (WinRM), SMB (Server Message Block), Enumeration, Printer Admin…

  • Creating a basic bash script

    Creating a basic bash script

    I'll show you how to create your first Bash script to perform a small fuzzing operation with the goal of gaining access…

  • Linux `find` Command

    Linux `find` Command

    ███████████████████████████████ ███ Linux `find` Command ███…

  • Cross-site WebSocket hijacking (CSWSH) | RC4 encryption

    Cross-site WebSocket hijacking (CSWSH) | RC4 encryption

    ?? Cybersecurity Journey Update: Inkplot Challenge Completed on HackMyVM! ?? Watch the video here: Link to Video I took…

社区洞察

其他会员也浏览了