Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Windows Exploit Development Megaprimer
Basics
Buffer Overflow Explained (13:14)
Exploiting Buffer Overflows
Vanilla EIP Overwrite (13:54)
Exploiting Vanilla EIP Overwrite (10:11)
Eliminating Bad Character in your Exploit (9:11)
Exploiting Buffer Overflow : Structured Exception Handler (SEH) Overwrite (21:46)
Exploit Development with Mona.py
Mona.py - The Exploit Writer's Swiss Army Knife (20:04)
Mona.py - Continuation (14:06)
Converting Exploits to Metasploit Modules with mona.py (15:42)
Advanced Exploit Development in Windows
Unicode Based Exploit Development Introduction (20:42)
Unicode Based Exploit Development Continuation (16:55)
Unicode Based Exploit Development Final Thoughts (19:32)
Egg Hunter Basics (12:51)
Writing an Exploit using Egg Hunter (16:59)
Data Execution Prevention (DEP) Basics (17:59)
Bypassing Data Execution Prevention (DEP) using ROP Chains (16:55)
Egg Hunter Basics
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock