Video Description

This lesson covers executing unintended code. Participants receive step by step instructions to create shell code to insert into an exploit. This lesson focuses on the endianness command which is used to store multiple data bytes.

Course Modules

Advanced Penetration Testing