Buffer Overflows Made Easy - 2022 Edition
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Dive into a comprehensive video tutorial on buffer overflow vulnerabilities and exploitation techniques. Learn how to identify, analyze, and exploit buffer overflows through hands-on demonstrations and practical examples. Explore key concepts such as spiking, fuzzing, finding offsets, overwriting EIP, identifying bad characters, and generating shellcode. Follow along with step-by-step instructions for downloading materials, setting up your environment, and executing various stages of a buffer overflow attack. Gain insights into using Python 3 for exploit development and apply your knowledge to a real-world scenario with a TryHackMe Brainstorm walkthrough. Enhance your cybersecurity skills and understanding of this critical vulnerability through this in-depth, practical guide.
Syllabus
- Introduction.
- Downloading Our Materials.
- Buffer Overflows Explained.
- Spiking.
- Fuzzing.
- Finding the Offset.
- Overwriting the EIP.
- Finding Bad Characters.
- Finding the Right Module.
- Generating Shellcode & Gaining Root.
- Python 3 & More.
- TryHackMe Brainstorm Walkthrough.
Taught by
The Cyber Mentor
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent