In the Exploit Development module of Advanced Penetration testing, you will learn how to write your own code for memory corruption exploits. The module covers the following primary topics: - A program in memory - Stack frame function - New compilers - Python - Executing unintended code - Network-based exploits - Creating a cyclic pattern - Verifying offsets - Creating shell code - Fuzzing - Public exploits - Turning a 3Com exploit into a Metasploit module - Structured exception handler over-write
Advanced Penetration Testing
This FREE course covers how to attack from the web using cross-site scripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you're breaking into to. You'll also learn tricks for exploiting a network.