Главная
Study mode:
on
1
Intro
2
Corelan Team
3
Exploiting software vulnerabilities
4
Why write exploits ?
5
Scientific Facts
6
What else?
7
What has Metasploit to offer?
8
Metasploit Standalone
9
Typical exploit dev process
10
Exploit dev takes time
11
Debugger plugins
12
mona.py to the rescue
13
mona.py initial config
14
Global options
15
First things first
16
Finding offsets
17
Exception Handlers
18
Unicode
19
ASLR & Rebase
20
Mona 3 Metasploit
21
DEP: how mona can help
22
Mona rop demo
Description:
Explore Win32 exploit development techniques using Mona and Metasploit in this 58-minute conference talk by Peter Van Eeckhoutte and Elliot Cutright. Dive into the world of software vulnerability exploitation, understanding the scientific facts behind it, and learn about Metasploit's capabilities. Discover the typical exploit development process, including the use of debugger plugins and the powerful mona.py tool. Gain insights on finding offsets, handling exceptions, dealing with Unicode, ASLR, and DEP challenges. Watch a demonstration of Mona's ROP capabilities and learn how to integrate Mona with Metasploit for more effective exploit development.

Win32 Exploit Development With Mona and Metasploit

Add to list