YoVDO

Buffer Overflows Made Easy

Offered By: Cyber Mentor via YouTube

Tags

Buffer Overflow Courses Cybersecurity Courses Ethical Hacking Courses Fuzzing Courses

Course Description

Overview

Dive into the world of 32-bit Windows buffer overflows through this comprehensive 30-minute course. Learn the step-by-step process of exploiting buffer overflows, starting with an introduction to the concept. Progress through spiking and fuzzing techniques, then master the art of finding offsets and overwriting the EIP. Explore methods for identifying bad characters and locating the right module. Finally, generate shellcode and gain shells to complete your understanding of this critical cybersecurity topic. Presented by Cyber Mentor, this course simplifies complex concepts, making buffer overflows accessible and easy to grasp for aspiring security professionals.

Syllabus

Buffer Overflows Made Easy - Part 1: Introduction.
Buffer Overflows Made Easy - Part 2: Spiking.
Buffer Overflows Made Easy - Part 3: Fuzzing.
Buffer Overflows Made Easy - Part 4: Finding the Offset.
Buffer Overflows Made Easy - Part 5: Overwriting the EIP.
Buffer Overflows Made Easy - Part 6: Finding Bad Characters.
Buffer Overflows Made Easy - Part 7: Finding the Right Module.
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells.


Taught by

The Cyber Mentor

Related Courses

C++ Lab Content
Infosec via Coursera
Ethical Hacking & Network Defe
City College of San Francisco via California Community Colleges System
Offensive Penetration Testing
Cybrary
Ethical Hacking
DeAnza College via California Community Colleges System
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
freeCodeCamp