YoVDO

Buffer Overflows Made Easy - Spiking

Offered By: Cyber Mentor via YouTube

Tags

Buffer Overflow Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses

Course Description

Overview

Explore the art of spiking in buffer overflows through this 10-minute video tutorial. Learn how to identify vulnerable commands within a program using techniques like connecting to Vulnserver, utilizing generic_send_tcp, and writing SPIKE scripts. Follow along as the instructor demonstrates spiking the Vulnserver STATS and TRUN commands, providing practical insights into this crucial aspect of cybersecurity. Gain valuable knowledge to enhance your understanding of buffer overflow vulnerabilities and improve your penetration testing skills.

Syllabus

- Housekeeping Items
- Connecting to Vulnserver
- Introducing generic_send_tcp
- Writing a SPIKE script
- Spiking the Vulnserver STATS command
- Writing a second SPIKE script
- Spiking the Vulnserver TRUN command / Reviewing results


Taught by

The Cyber Mentor

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent