Metasploit Fuzzing and Exploit Development
Offered By: YouTube
Course Description
Overview
Dive into the world of cybersecurity with this 57-minute video that covers Metasploit fuzzing and exploit development techniques. Learn about buffer overflows, stack manipulation, and x86 registers while exploring the process of creating and testing exploits. Discover how to use pattern_create(), develop skeleton exploits, and incorporate shellcode. Gain valuable insights into the foundational concepts that inspired the creation of Derbycon, a renowned information security conference. Access essential resources to further your understanding of exploit development and enhance your cybersecurity skills.
Syllabus
Intro
First Things First
What is an overflow
What is the Stack
Fuzzing
X86 Registers
Enter Pattern_create()
Skeleton Exploit
Testing the return
Adding the Shellcode
Resources
Related Courses
Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKINGUdemy MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent ChatGPT for Cybersecurity
HackerSploit via YouTube Browser Exploitation - Max Zinkus
White Hat Cal Poly via YouTube ARM Assembly and Shellcode Basics - Workshop
44CON Information Security Conference via YouTube