Recent Posts

  • Samba Server Exploitation January 17, 2018
  • GDB Tutorial January 16, 2018
  • Hacking Samba on Ubuntu and Installing the Meterpreter January 16, 2018
Prepare for Offensive Security Certified Professional
Menu
  • Article
  • Industry News for IT Security
  • OSCP
    • OSCP Official Complete Guide
    • OSCP Exp. Sharing
  • Wifi Hacking
  • Online Resources
  • Lab
  • Must Try
  • Vulnerability Database
  • Skills
    • Buffer Overflow
    • Privilege Escalation
    • Null Session
    • SSH

EXPLOIT RESEARCH MEGAPRIMER

Home / EXPLOIT RESEARCH MEGAPRIMER
16 Nov

EXPLOIT RESEARCH MEGAPRIMER

  • Pentester
  • Buffer Overflow
  • Tags: Buffer Overflow, video
  • no comments
Description: In this video series, we will learn how to program exploits for various vulnerabilities published online. We will also look at how to use various tools and techniques to find Zero Day vulnerabilities in both open and closed source software.

Author: SecurityTube_BotTags: exploitation, exploit research, megaprimer

No. Thumbnail Video Title
1 Exploit Research Megaprimer Part 1 Topic Introduction By Vivek
2 Exploit Research Megaprimer Part 2 Memcpy Buffer Overflow
3 Exploit Research Megaprimer Part 3 Strcpy Buffer Overflow
4 Exploit Research Megaprimer Part 4 Minishare Buffer Overflow
5 Exploit Research Megaprimer Part 5 Freesshd Buffer Overflow
6 Exploit Research Megaprimer Part 6 Seh Basics
7 Exploit Research Megaprimer Part 7 Overwrite Seh
8 Exploit Research Megaprimer Part 8 Exploiting Seh

Original Link

Share this Post

← Previous Article Next Article→

Related Articles

  • How to turn off gcc compiler optimization to enable buffer overflow
    How to turn off gcc compiler optimization to enable buffer overflow December 15, 2017
  • Buffer Overflow Attack – Computerphile
    Buffer Overflow Attack – Computerphile December 3, 2017
  • CHECKSEC.SH NOW WITH FORTIFY_SOURCE SUPPORT
    CHECKSEC.SH NOW WITH FORTIFY_SOURCE SUPPORT December 2, 2017

Comments are closed.

Site Categories

  • Article (15)
  • Backdoor (1)
  • Buffer Overflow (16)
  • Case Studies (2)
  • Cheat Sheet (6)
  • ColdFusion (6)
  • Lab (6)
  • Metasploit (7)
  • Must Try (2)
  • Netcat (1)
  • Null Session (5)
  • Online Resources (2)
  • OS Fingerprinting (1)
  • OSCP Exp. Sharing (8)
  • Payloads (4)
  • Privilege Escalation (14)
  • RFI and LFI (2)
  • Samba / SMB (3)
  • Skills (63)
  • SQL Injection (4)
  • SSH (5)
  • Uncategorized (2)
  • Vulnerability Database (5)
  • Wifi Hacking (2)

Tag Cloud

445 airodump-ng APSB09-09 authentication bypass Buffer Overflow burp bypassuac cfm shell C functions vulnerable data breach fckeditor getsystem getuid google kali kali wifi hack Linux Privilege Escalation memory corruption memory layout metasploit Meterpreter meterpreter command mitm MS08_067 ms11-080 msfvenom null session oscp oscp exp sharing Privilege Escalation ps psexec pyinstaller pywin32 rpcclient shellcode smb stack steal_token systeminfo UAC bypass union injections wifi hacking wifiphisher wmic

Blog Posts

Samba Server Exploitation GDB Tutorial Hacking Samba on Ubuntu and Installing the Meterpreter

Tag Clouds

445 airodump-ng APSB09-09 authentication bypass Buffer Overflow burp bypassuac cfm shell C functions vulnerable data breach fckeditor getsystem getuid google kali kali wifi hack Linux Privilege Escalation memory corruption memory layout metasploit Meterpreter meterpreter command mitm MS08_067 ms11-080 msfvenom null session oscp oscp exp sharing Privilege Escalation ps psexec pyinstaller pywin32 rpcclient shellcode smb stack steal_token systeminfo UAC bypass union injections wifi hacking wifiphisher wmic
Copyright © 2017 pentest.tonyng.net. All rights reserved.
    Scroll