21 hours 43 minutes
introduction to buffer overflows.
How to practice buffer overflows
are learning objective is to identify resources available to practice buffer overflows.
So the legendary buffer overflow, this is something that you need to practice and get good at.
Um Again I can't give away anything about. Oh SCP
but in the course material they show you and go through a buffer overflow.
If you're also thinking about doing E C P P T. As a pathway to. Oh SCP
the buffer overflow is very important as well.
You'll notice that a lot of people when they write or give interest to buffer overflows,
they're using older machines. Maybe it's Windows XP A 32 bit system and X 86 execute herbal something that's older. So that's why I do have that Windows XP Vm. I have old school is to practice all my buffer overflows on.
So what you also need to do on your vulnerable machine is you need to install immunity D bugger, which is what they have in the P W. K. Material and you put that on your vulnerable machine. Again, if you're practicing this or planning to e C P P. T.
Uh you definitely need to get a VM and install immunity to bugger on it. And you also need to install python the X 86 version
as well as Mona. And that will help you run different mona modules which you'll see later and why that's important.
So I just want to give you some resources other than this course, if you want to practise buffer overflows I would say after over everything that I practiced,
I practiced buffer overflow the most and it was a good strategy um I would say that also doing hands on cts and labs is also important. So don't put everything on the buffer overflow. The buffer overflow is important but it's not the most important thing to do
so balance your time accordingly.
One resource is this war ftp version 1.65
in George's book penetration testing, a hands on approach. You need to have an older VM for this. You need to have Windows XP. It won't work on newer. Os is it won't work on Windows 10.
Wouldn't work on windows seven for me. So it did work on Windows XP.
There is also free float FTp server.
All these things you can download or at least this one you can download exploit dB
and there's also a medium article walkthrough on it. Look at people's walk throughs and see how they, how they do this. Some people's techniques are better than others. Some people, as you can tell, have more programming skills than other people.
I don't have a very big development background. So I typically just go off of the demos that they give the P W K methodology, so that's what I use, but uh you'll see what will be using. Um there is a whole right up on it and the guy obviously
is a developer and his coding is beautiful, for lack of a better word.
There's also many share 1 4.1 another exploit DB
um where you can download it, remote buffer overflow. There's an info Sec Institute article walkthrough on this. Don't worry about the bitterly link.
Um but you should be able to get to this
walk through and again, it's it's a nice walk through. I encourage you to read through it and again, if you want to do this many share 1.4 point one, um that's where you can find it on exploit dB,
das stack buffer buffer overflow. Good is what we're gonna be using. There's a whole right up on this. The guy has a whole pdf that's why I chose this one is because this guy is right up is great. He walks you through everything. So
you know, in essence you have another instructor, you have a pdf that you can look through
to help you with the buffer overflow. I practice this his way, I practice the, practice the P W K way and you'll see when we walk through it, how I go through it, you find your own strategy,
but ultimately you're going to need to figure out how to write something like this up
and logically coherently and understand the process.
So in summary, you should now be able to identify the resources available to practice buffer overflows
and we'll be getting a lot of hands on practice as we continue through this module.
Introduction to IT & Cybersecurity
Are you new to IT & cybersecurity and wondering which role might suit you best? ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Penetration Testing and Ethical Hacking
To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform ...
7 CEU/CPE Hours Available
Certificate of Completion Offered