Buffer Overflows Made Easy - 2022 Edition
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Dive into a comprehensive video tutorial on buffer overflow vulnerabilities and exploitation techniques. Learn how to identify, analyze, and exploit buffer overflows through hands-on demonstrations and practical examples. Explore key concepts such as spiking, fuzzing, finding offsets, overwriting EIP, identifying bad characters, and generating shellcode. Follow along with step-by-step instructions for downloading materials, setting up your environment, and executing various stages of a buffer overflow attack. Gain insights into using Python 3 for exploit development and apply your knowledge to a real-world scenario with a TryHackMe Brainstorm walkthrough. Enhance your cybersecurity skills and understanding of this critical vulnerability through this in-depth, practical guide.
Syllabus
- Introduction.
- Downloading Our Materials.
- Buffer Overflows Explained.
- Spiking.
- Fuzzing.
- Finding the Offset.
- Overwriting the EIP.
- Finding Bad Characters.
- Finding the Right Module.
- Generating Shellcode & Gaining Root.
- Python 3 & More.
- TryHackMe Brainstorm Walkthrough.
Taught by
The Cyber Mentor
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network