Oct. 6, 2023, 7 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

In this video, we'll continue our exploration of software exploitation by walking through how to capture an overflow with a debugger. In this demo, we'll start our vulnerable program in WinDbg, find it's entry point and begin our debug session. We'll then look at how memory is overflown and, finally, capture the instruction pointer to confirm we've taken control!

00:24 Getting started with a debugger (WinDbg)
1:15 Starting the debug session
1:22 Finding the programs entry point
1:50 ASLR and …

buffer buffer overflow capture continue debug debugger demo entry exploit exploitation find memory overflow point program session software stack start video vulnerable windbg

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Data Privacy Manager m/f/d)

@ Coloplast | Hamburg, HH, DE

Cybersecurity Sr. Manager

@ Eastman | Kingsport, TN, US, 37660

KDN IAM Associate Consultant

@ KPMG India | Hyderabad, Telangana, India

Learning Experience Designer in Cybersecurity (f/m/div.) (Salary: ~113.000 EUR p.a.*)

@ Bosch Group | Stuttgart, Germany

Senior Security Engineer - SIEM

@ Samsara | Remote - US