Buffer Overflows Made Easy - 2022 Edition
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Dive into a comprehensive video tutorial on buffer overflow vulnerabilities and exploitation techniques. Learn how to identify, analyze, and exploit buffer overflows through hands-on demonstrations and practical examples. Explore key concepts such as spiking, fuzzing, finding offsets, overwriting EIP, identifying bad characters, and generating shellcode. Follow along with step-by-step instructions for downloading materials, setting up your environment, and executing various stages of a buffer overflow attack. Gain insights into using Python 3 for exploit development and apply your knowledge to a real-world scenario with a TryHackMe Brainstorm walkthrough. Enhance your cybersecurity skills and understanding of this critical vulnerability through this in-depth, practical guide.
Syllabus
- Introduction.
- Downloading Our Materials.
- Buffer Overflows Explained.
- Spiking.
- Fuzzing.
- Finding the Offset.
- Overwriting the EIP.
- Finding Bad Characters.
- Finding the Right Module.
- Generating Shellcode & Gaining Root.
- Python 3 & More.
- TryHackMe Brainstorm Walkthrough.
Taught by
The Cyber Mentor
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera