@LiveOverflow
  @LiveOverflow
LiveOverflow | Debugging The Failing sudoedit Exploit | Ep.16 @LiveOverflow | Uploaded 2 years ago | Updated 6 hours ago
Our exploit doesn't work as the user. So now we need to investigate and figure out how we can make it work. We explore three options and implement additional code, but nothing seems to work.

Grab the files: github.com/LiveOverflow/pwnedit

Episode 16:
00:00 - Intro
00:23 - How To Debug The Failing Exploit?
00:49 - Core Dumps
01:49 - Wait in Execution Wrapper to Attach gdb
02:28 - Difference Running sudoedit as root vs. user?
03:00 - Option 1: Bruteforce Offsets Perfectly
03:38 - Option 2: Fengshui as user
04:18 - Option 3: Analyze Our Failing Crash
04:48 - Comparing Option 1 vs. 2
05:45 - Implementing Option 1
07:56 - Implementing Option 2
09:16 - Running Option 2
10:03 - It Doesn't Work in Docker
11:11 - Outro

-=[ ❀️ Support ]=-

β†’ per Video: patreon.com/join/liveoverflow
β†’ per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ• Social ]=-

β†’ Twitter: twitter.com/LiveOverflow
β†’ Instagram: instagram.com/LiveOverflow
β†’ Blog: liveoverflow.com
β†’ Subreddit: reddit.com/r/LiveOverflow
β†’ Facebook: facebook.com/LiveOverflow
Debugging The Failing sudoedit Exploit | Ep.16WebKit RegExp Exploit addrof() walk-through$100k Hacking Prize - Security Bugs in Google Cloud Platformey! Look for patternsDO NOT USE alert(1) for XSSThe Butterfly of JSObjectGuessing vs. Not Knowing in Hacking and CTFsCTFs are AWESOME!YouTube BANNING Hacking Videos - Hot TakeI made every video I ever wanted to makeHow To Learn Something New? - Game Devlog #1How To Learn Hacking With CTFs

Debugging The Failing sudoedit Exploit | Ep.16 @LiveOverflow

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER