Sign in to confirm you’re not a bot
This helps protect our community. Learn more
LiveOverflow Channel Introduction and Backstory - bin 0x00
8.3KLikes
580,372Views
2015Dec 14
A little bit of background why I created this channel and what you can expect. =[ ❤️ Support ]= → per Video:   / liveoverflow   → per Month:    / @liveoverflow   =[ 🐕 Social ]= → Twitter:   / liveoverflow   → Website: https://liveoverflow.com/ → Subreddit:   / liveoverflow   → Facebook:   / liveoverflow   =[ 📄 P.S. ]= All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

Follow along using the transcript.

LiveOverflow

920K subscribers

LiveOverflow Channel Introduction and Backstory - bin 0x00

LiveOverflow
2

Introduction to Linux - Installation and the Terminal - bin 0x01

LiveOverflow
3

Writing a simple Program in C

LiveOverflow
4

Writing a simple Program in Python - bin 0x03

LiveOverflow
5

How a CPU works and Introduction to Assembler - bin 0x04

LiveOverflow
6

Reversing and Cracking first simple Program - bin 0x05

LiveOverflow
7

Simple Tools and Techniques for Reversing a binary - bin 0x06

LiveOverflow
8

Uncrackable Programs? Key validation with Algorithm and creating a Keygen - Part 1/2 - bin 0x07

LiveOverflow
9

Uncrackable Program? Finding a Parser Differential in loading ELF - Part 2/2 - bin 0x08

LiveOverflow
10

Syscalls, Kernel vs. User Mode and Linux Kernel Source Code - bin 0x09

LiveOverflow
11

The deal with numbers: hexadecimal, binary and decimals - bin 0x0A

LiveOverflow
12

Smashing the Stack for Fun and Profit - setuid, ssh and exploit.education - bin 0x0B

LiveOverflow
13

First Stack Buffer Overflow to modify Variable - bin 0x0C

LiveOverflow
14

Buffer Overflows can Redirect Program Execution - bin 0x0D

LiveOverflow
15

First Exploit! Buffer Overflow with Shellcode - bin 0x0E

LiveOverflow
16

Doing ret2libc with a Buffer Overflow because of restricted return pointer - bin 0x0F

LiveOverflow
17

Exploit Fails? Debug Your Shellcode - bin 0x2B

LiveOverflow
18

Reverse engineering C programs (64bit vs 32bit) - bin 0x10

LiveOverflow
19

Finding main() in Stripped Binary - bin 0x2C

LiveOverflow
20

Reversing Statically-Linked Binaries with Function Signatures - bin 0x2D

LiveOverflow
21

A simple Format String exploit example - bin 0x11

LiveOverflow
22

Global Offset Table (GOT) and Procedure Linkage Table (PLT) - bin 0x12

LiveOverflow
23

Format String Exploit and overwrite the Global Offset Table - bin 0x13

LiveOverflow
24

Exploit Dev Pitfall Corrupted Shellcode

LiveOverflow
25

Writing a Simple Buffer Overflow Exploit

LiveOverflow
26

The Heap: what does malloc() do? - bin 0x14

LiveOverflow
27

The Heap: How to exploit a Heap Overflow - bin 0x15

LiveOverflow
28

Explaining Dirty COW local root exploit - CVE-2016-5195

LiveOverflow
29

The Heap: How do use-after-free exploits work? - bin 0x16

LiveOverflow
30

The Heap: Once upon a free() - bin 0x17

LiveOverflow
31

The Heap: dlmalloc unlink() exploit - bin 0x18

LiveOverflow
32

First steps into networking with net0 from exploit.education protostar - bin 0x19

LiveOverflow
33

TCP Protocol introduction - bin 0x1A

LiveOverflow
34

Socket programming in python and Integer Overflow - bin 0x1B

LiveOverflow
35

Linux signals and core dumps - bin 0x1C

LiveOverflow
36

First remote root exploit - bin 0x1D

LiveOverflow
37

Remote format string exploit in syslog() - bin 0x1E

LiveOverflow
38

[Live] Remote oldschool dlmalloc Heap exploit - bin 0x1F

LiveOverflow
39

Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195

LiveOverflow
40

Developing an intuition for binary exploitation - bin 0x20

LiveOverflow
41

Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21

LiveOverflow
42

Identifying another exploit mitigation and find bypass. stack0: part 2 - bin 0x22

LiveOverflow
43

Bruteforce 32bit Stack Cookie. stack0: part 3 - bin 0x23

LiveOverflow
44

Playing around with a Format String vulnerability and ASLR. format0 - bin 0x24

LiveOverflow
45

Stack grooming and 100% reliable exploit for format0 - bin 0x25

LiveOverflow
46

format2 on a modern Ubuntu - bin 0x26

LiveOverflow
47

Adapting the 32bit exploit to 64bit for format4 - bin 0x27

LiveOverflow
48

heap0 exploit speedrun & weird ASCII string on the Heap - bin 0x28

LiveOverflow
49

Introducing Weird Machines: ROP Differently Explaining part 1 - bin 0x29

LiveOverflow
50

Weird Return-Oriented Programming Tutorial - bin 0x2A

LiveOverflow
51

Mindmapping a Pwnable Challenge - intro_pwn/pwn1 CSCG 2020

LiveOverflow
52

Cannot access memory at address // Debugging PIE Binaries affected by ASLR - bin 0x2E

LiveOverflow
53

Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)

LiveOverflow
54

File Path Race Condition & How To Prevent It - bin 0x31

LiveOverflow
55

Race Condition Trick /proc/self/fd

LiveOverflow
56

Introduction to Docker for CTFs

LiveOverflow
57

Solving Pwnable CTF Challenge With Docker Workflow

LiveOverflow
58

Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

LiveOverflow
59

Self-Learning Reverse Engineering in 2022

LiveOverflow