This lesson focuses on creating a cyclic pattern using the immunity debugger. Participants receive step by step instructions to create a cyclic pattern using the python command. The lesson also discusses operating system DLLs and how they can be used in exploit development.
Advanced Penetration Testing
This FREE course covers how to attack from the web using cross-site scripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you're breaking into to. You'll also learn tricks for exploiting a network.