Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Basic Stack Buffer Overflow with Parameters - Return to Win Function Tutorial

CryptoCat via YouTube

Overview

Learn how to exploit a classic buffer overflow vulnerability in this video walkthrough of the "Retro2Win" pwn challenge from Intigriti's 1337UP LIVE CTF 2024. Master the process of binary exploitation by following a detailed demonstration that covers essential file checks, binary functionality review, static analysis using Ghidra, and dynamic analysis with GDB. Discover how to identify buffer overflow offsets and develop a proof-of-concept exploit using pwntools, with special attention to parameter handling and register manipulation (RDI/RSI). Progress through practical steps including basic security checks, disassembly analysis, and exploit development while gaining insights into calling win functions with specific parameters. Perfect for those interested in binary exploitation, CTF competitions, and practical cybersecurity skills.

Syllabus

Intro
Basic file checks
Review binary functionality
Disassemble with ghidra static analysis
Identify overflow offset in GDB dynamic analysis
Develop exploit PoC pwntools script
Recap
Conclusion

Taught by

CryptoCat

Reviews

Start your review of Basic Stack Buffer Overflow with Parameters - Return to Win Function Tutorial

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.