LiveOverflow | C Code Review - Reaching Vulnerable Code in sudo | Ep. 08 @LiveOverflow | Uploaded 3 years ago | Updated 2 hours ago
A bit more code review of sudo to understand why it's vulnerable and what the conditions are to get there.
Full Playlist: youtube.com/watch?v=TLa2VqcGGEQ&list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx
Grab the files: github.com/LiveOverflow/pwnedit
Episode 08:
00:00 - Intro
00:18 - The Heap Overflow
02:27 - Identifying the Conditions to Reach the Vulnerable Code
03:00 - The sudo Modes
03:40 - Sudo is Escaping The Arguments!
04:25 - How to Skip the Escaping?
05:16 - The Curious Case of "sudoedit"
06:15 - Exploring Alternative sudo modes
07:05 - Outro
07:35 - #ads
-=[ ❤️ Support ]=-
→ per Video: patreon.com/join/liveoverflow
→ per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: twitter.com/LiveOverflow
→ Website: liveoverflow.com
→ Subreddit: reddit.com/r/LiveOverflow
→ Facebook: facebook.com/LiveOverflow
A bit more code review of sudo to understand why it's vulnerable and what the conditions are to get there.
Full Playlist: youtube.com/watch?v=TLa2VqcGGEQ&list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx
Grab the files: github.com/LiveOverflow/pwnedit
Episode 08:
00:00 - Intro
00:18 - The Heap Overflow
02:27 - Identifying the Conditions to Reach the Vulnerable Code
03:00 - The sudo Modes
03:40 - Sudo is Escaping The Arguments!
04:25 - How to Skip the Escaping?
05:16 - The Curious Case of "sudoedit"
06:15 - Exploring Alternative sudo modes
07:05 - Outro
07:35 - #ads
-=[ ❤️ Support ]=-
→ per Video: patreon.com/join/liveoverflow
→ per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: twitter.com/LiveOverflow
→ Website: liveoverflow.com
→ Subreddit: reddit.com/r/LiveOverflow
→ Facebook: facebook.com/LiveOverflow