ISAC Cambodia (InfoSec)
Video

EXPLOIT RESEARCH MEGAPRIMER PART 4 MINISHARE BUFFER OVERFLOW

Welcome to Part 4 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have not already done so!

In this video, we will look at how to exploit a buffer overflow which was disclosed on Exploit-Db – Minishare 1.4.1 Buffer Overflow. You can download the Minishare Program and follow this video.

We will first start by understanding the vulnerability from it’s description on Exploit-Db and then reproduce the same in our lab setup. After this, we will use the Immunity Debgugger to examine the exploit conditions, find the offsets for RET and ESP overwrite, find the bad characters which are 0x00 and 0x0D, create shellcode for the payload encoding for these bad characters, create the exploit program and finally exploit the program! This whole journey is 30 minutes long, so fasten your seat belts and take our your debuggers 🙂

Show More

Phannarith

Mr. OU Phannarith is one of the well-known cybersecurity experts in Cambodia and the region. He is the founder of the first leading information security website (www.secudemy.com) in Cambodia. He has been invited to present in global conferences, forums, and seminars and he was awarded in Information Security Leadership Achievements (ISLA) in 2016 by (ISC)2 and in December 2012 as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Group (IDG). Mr. OU has been the Professor specializing in Cybersecurity.

Related Articles

Back to top button