14 hours 26 minutes

Video Description

In the Exploit Development module of Advanced Penetration testing, you will learn how to write your own code for memory corruption exploits. The module covers the following primary topics: - A program in memory - Stack frame function - New compilers - Python - Executing unintended code - Network-based exploits - Creating a cyclic pattern - Verifying offsets - Creating shell code - Fuzzing - Public exploits - Turning a 3Com exploit into a Metasploit module - Structured exception handler over-write

Video Transcription

Well, we're hearing the end of the course on I want to show you a little bit about building your own exploits. Throughout the class, we've used people's exploits. We've used tools like medicine Boyd made by a lot of people actually on. We've even used some code off places like exploit database,
public exploit code by an individual or a team.
But we haven't really seen how to create our own exploit code. And some cases we've just been able to manually exploit an issue like the very secure FTP smiley face back door. That was easy, but let's take a look at how one can actually discover and right
code for memory corruption exploits.

Up Next

Advanced Penetration Testing

This course covers how to attack from the web using cross-site scripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you're breaking into to. You'll also learn tricks for exploiting a network.

Instructed By

Instructor Profile Image
Georgia Weidman
Founder and CTO at Shevirah and Bulb Security