Главная
Study mode:
on
1
Intro
2
Tools
3
Bad Tools
4
Write Your Own
5
Buffer Overflow Example
6
Stack Smashing
7
Python Script
8
Is it reliable
9
How to determine the offset
10
Immunity debugger
11
What I learned
12
Conclusion
Description:
Explore advanced exploit development techniques in this 46-minute conference talk from BSides Detroit 2015. Learn to move beyond Metasploit and create custom exploits, focusing on buffer overflow vulnerabilities. Discover essential tools, understand stack smashing, and gain hands-on experience with Python scripting and Immunity debugger. Delve into determining reliable offsets and assessing exploit reliability. Gain valuable insights into the world of exploit writing and enhance your cybersecurity skills through practical examples and expert guidance.

Moving Past Metasploit - Writing Your First Exploit

Add to list
0:00 / 0:00