@LiveOverflow
  @LiveOverflow
LiveOverflow | C Code Review - Reaching Vulnerable Code in sudo | Ep. 08 @LiveOverflow | Uploaded 3 years ago | Updated 2 hours ago
A bit more code review of sudo to understand why it's vulnerable and what the conditions are to get there.

Full Playlist: youtube.com/watch?v=TLa2VqcGGEQ&list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx

Grab the files: github.com/LiveOverflow/pwnedit

Episode 08:
00:00 - Intro
00:18 - The Heap Overflow
02:27 - Identifying the Conditions to Reach the Vulnerable Code
03:00 - The sudo Modes
03:40 - Sudo is Escaping The Arguments!
04:25 - How to Skip the Escaping?
05:16 - The Curious Case of "sudoedit"
06:15 - Exploring Alternative sudo modes
07:05 - Outro
07:35 - #ads

-=[ ❤️ Support ]=-

→ per Video: patreon.com/join/liveoverflow
→ per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: twitter.com/LiveOverflow
→ Website: liveoverflow.com
→ Subreddit: reddit.com/r/LiveOverflow
→ Facebook: facebook.com/LiveOverflow
C Code Review - Reaching Vulnerable Code in sudo | Ep. 08Pain in your Hand (RSI)?What is a Browser Security Sandbox?! (Learn to Hack Firefox)Attacking LLM - Prompt InjectionWinners of Google Capture-The-Flag Finals 2019 🏳️Revisiting 2b2t Tamed Animal Coordinate ExploitHow SUDO on Linux was HACKED! // CVE-2021-3156Best Operating Systems for Hacking?!XSS a Paste Service - Pasteurize (web) Google CTF 2020Developing a Tool to Find Function Pointers on The Heap | Ep. 10Chaining Script Gadgets to Full XSS - All The Little Things 2/2 (web) Google CTF 2020Creating The First (Failed) Sudoedit Exploit | Ep. 15

C Code Review - Reaching Vulnerable Code in sudo | Ep. 08 @LiveOverflow

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER