YoVDO

Metasploit Fuzzing and Exploit Development

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Metasploit Courses Buffer Overflow Courses Exploit Development Courses Fuzzing Courses Shellcode Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into the world of cybersecurity with this 57-minute video that covers Metasploit fuzzing and exploit development techniques. Learn about buffer overflows, stack manipulation, and x86 registers while exploring the process of creating and testing exploits. Discover how to use pattern_create(), develop skeleton exploits, and incorporate shellcode. Gain valuable insights into the foundational concepts that inspired the creation of Derbycon, a renowned information security conference. Access essential resources to further your understanding of exploit development and enhance your cybersecurity skills.

Syllabus

Intro
First Things First
What is an overflow
What is the Stack
Fuzzing
X86 Registers
Enter Pattern_create()
Skeleton Exploit
Testing the return
Adding the Shellcode
Resources


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube