Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cybersecurity professionals, students, career changers, and more, growing their careers on Cybrary.
This Virtual Lab is part of a Career Path: Become a Cyber Defense Analyst
Students will identify the use of a Buffer Overflow exploit through the use of Wireshark and by analyzing items found in the captured traffic. The students will also find the exploit code and isolate the different aspects of a Buffer Overflow exploit.