<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>C Code Review - Reaching Vulnerable Code in sudo | Ep. 08</title>
        <link>https://stream.echo6.co/videos/watch/c8820ef1-9608-4614-8e1e-3ebb9ffc9186</link>
        <description>A bit more code review of sudo to understand why it's vulnerable and what the conditions are to get there. Full Playlist: https://www.youtube.com/watch?v=TLa2VqcGGEQ&amp;list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx Grab the files: https://github.com/LiveOverflow/pwnedit Episode 08: 00:00 - Intro 00:18 - The Heap Overflow 02:27 - Identifying the Conditions to Reach the Vulnerable Code 03:00 - The sudo Modes 03:40 - Sudo is Escaping The Arguments! 04:25 - How to Skip the Escaping? 05:16 - The Curious Case of "sudoedit" 06:15 - Exploring Alternative sudo modes 07:05 - Outro 07:35 - #ads -=[ ❤️ Support ]=- → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:53:23 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>C Code Review - Reaching Vulnerable Code in sudo | Ep. 08</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/c8820ef1-9608-4614-8e1e-3ebb9ffc9186</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=c8820ef1-9608-4614-8e1e-3ebb9ffc9186" rel="self" type="application/rss+xml"/>
    </channel>
</rss>