iOS 10 – Explaining Exploits / Buffer Overflows (For Beginners)

In Today's video we are going to continue the Reverse Engineering for Beginners series and we're discussing about iOS Exploits and Exploits in general. We're going to cover the Stack and security mechanisms like ASLR, DEP and Canaries, and I will explain in depth how a Buffer Overflow (most common exploit) works. 

In this video I will also talk about ShellCode, what it is, and what happens once you start executing it. I have also written a text article about this that you can check out on my website. On the website I have used a real life exploit, being a Privilege Escalation Exploit for OS X El Capitan. You can find the written tutorial down bellow.

You can consider it a Part 1, as in this video i've set up the basics about the stack and how we exploit it. In the next video that I will probably make in the next few days, I will demonstrate how these work on an applied example.

==Resources==
Buffer Overflow Wikipedia: //goo.gl/Fqjzu3
Written Tutorial: //goo.gl/hnSTA8
Reverse Engineering Playlist: //goo.gl/vy8OYE
OS X Exploit Explained: //youtu.be/KRi0iMWB6vQ

GeoSn0w

About GeoSn0w

C#, C, Objective-C Programmer | Beginner iOS Security Researcher | Content Creator | Web Developer I like to bring the latest news from the iOS / iDevice / Jailbreak battlefield to you in a beautiful manner :) I hope you like the site. If you do, don't forget to check out my channel :)

Leave a Reply