Binary Exploit Development Tutorial - Simple Buffer Overflow

preview_player
Показать описание
Learn how to exploit a simple buffer overflow in the first chapter of our binary exploitation tutorial series. Exploit development is a path that red teamers can take which will have them specialize in reverse engineering of executable files, which provide an attack service not typically open to your average attacker. This allows you to create custom exploits for various server executables that you may find in your environment.

This is our first tutorial in our binary exploit development series. We plan to create at least 5 tutorials of increasing difficulty. We recommend you have at least 6 months of hacking/coding experience before jumping into this series. If you have finished GHB2 then you are in a good position for this series, as you will need significant reverse engineering skills.

This is not for beginners, we are not going to hold your hand in this series.

Welcome to part one of my binary exploitation series. In the world of binary exploitation, buffer overflows make up the most common attacks, so we'll be going over one of those today. This article was made to accompany our video tutorial, we recommend you watch the video and use the article as reference when needed.

GH Binary Exploit Development Tutorial - Main Article

Download VulnServer here:

Рекомендации по теме