Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hands-on Fuzzing and Exploit Development
Module 1 (Stack-based Buffer Overflow)
Introduction (3:23)
Fuzzing (7:34)
PoC Creation (6:37)
Controlling the execution (11:23)
Bad character analysis (7:25)
Cracking the shell (6:53)
Assignment: Develop a working exploit for JetAudio jetCast Server 2.0
Module 2 (SEH Overwrite)
Introduction (4:21)
Fuzzing (7:53)
PoC Creation (11:03)
Controlling the execution (11:56)
Bad character analysis (10:14)
Cracking the shell (7:08)
Assignment: Develop a working exploit for DeviceViewer 3.12.0.1
Module 3 (Input Field Exploits / Multi-stage)
Introduction (3:15)
Fuzzing (13:02)
PoC Creation (3:52)
Controlling the Execution (15:48)
Bad character analysis (11:02)
Cracking the shell - Stage 1 (16:25)
Cracking the shell - Stage 2 (9:41)
Exploit Write-ups
Developing remote SEH overwrite exploit for Integard Pro 2.2.0.9026
Developing local stack overflow exploit for FTP Commander Pro 8.03
Teach online with
Bad character analysis
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock