Exploit Development Introduction (part 1)

Video Activity

In the Exploit Development module of Advanced Penetration testing, you will learn how to write your own code for memory corruption exploits. The module covers the following primary topics: - A program in memory - Stack frame function - New compilers - Python - Executing unintended code - Network-based exploits - Creating a cyclic pattern - Verifyin...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
14 hours 26 minutes
Difficulty
Advanced
Video Description

In the Exploit Development module of Advanced Penetration testing, you will learn how to write your own code for memory corruption exploits. The module covers the following primary topics: - A program in memory - Stack frame function - New compilers - Python - Executing unintended code - Network-based exploits - Creating a cyclic pattern - Verifying offsets - Creating shell code - Fuzzing - Public exploits - Turning a 3Com exploit into a Metasploit module - Structured exception handler over-write

Video Transcription
00:04
Well, we're hearing the end of the course on I want to show you a little bit about building your own exploits. Throughout the class, we've used people's exploits. We've used tools like medicine Boyd made by a lot of people actually on. We've even used some code off places like exploit database,
00:23
public exploit code by an individual or a team.
00:28
But we haven't really seen how to create our own exploit code. And some cases we've just been able to manually exploit an issue like the very secure FTP smiley face back door. That was easy, but let's take a look at how one can actually discover and right
00:44
code for memory corruption exploits.
Up Next