Oct. 6, 2023, 7 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

In this video, we'll continue our exploration of software exploitation by walking through how to capture an overflow with a debugger. In this demo, we'll start our vulnerable program in WinDbg, find it's entry point and begin our debug session. We'll then look at how memory is overflown and, finally, capture the instruction pointer to confirm we've taken control!

00:24 Getting started with a debugger (WinDbg)
1:15 Starting the debug session
1:22 Finding the programs entry point
1:50 ASLR and …

buffer buffer overflow capture continue debug debugger demo entry exploit exploitation find memory overflow point program session software stack start video vulnerable windbg

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC