Главная
Study mode:
on
1
Intro
2
First Things First
3
What is an overflow
4
What is the Stack
5
Fuzzing
6
X86 Registers
7
Enter Pattern_create()
8
Skeleton Exploit
9
Testing the return
10
Adding the Shellcode
11
Resources
Description:
Dive into the world of cybersecurity with this 57-minute video that covers Metasploit fuzzing and exploit development techniques. Learn about buffer overflows, stack manipulation, and x86 registers while exploring the process of creating and testing exploits. Discover how to use pattern_create(), develop skeleton exploits, and incorporate shellcode. Gain valuable insights into the foundational concepts that inspired the creation of Derbycon, a renowned information security conference. Access essential resources to further your understanding of exploit development and enhance your cybersecurity skills.

Metasploit Fuzzing and Exploit Development

Add to list
0:00 / 0:00