14 hours 26 minutes

Video Description

In the Exploit Development module of Advanced Penetration testing, you will learn how to write your own code for memory corruption exploits. The module covers the following primary topics: - A program in memory - Stack frame function - New compilers - Python - Executing unintended code - Network-based exploits - Creating a cyclic pattern - Verifying offsets - Creating shell code - Fuzzing - Public exploits - Turning a 3Com exploit into a Metasploit module - Structured exception handler over-write

Video Transcription

Well, we're hearing the end of the course on I want to show you a little bit about building your own exploits. Throughout the class, we've used people's exploits. We've used tools like medicine Boyd made by a lot of people actually on. We've even used some code off places like exploit database,
public exploit code by an individual or a team.
But we haven't really seen how to create our own exploit code. And some cases we've just been able to manually exploit an issue like the very secure FTP smiley face back door. That was easy, but let's take a look at how one can actually discover and right
code for memory corruption exploits.

Up Next

Advanced Penetration Testing

The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.

Instructed By

Instructor Profile Image
Georgia Weidman
Founder and CTO at Shevirah and Bulb Security