Course curriculum

  • 1

    Introduction

  • 2

    Preparing the Battlefield

  • 3

    Buffer Overflow Vulnerabilities, Exploits & Attacks

    • Buffer Overflow Exploit Development: Spiking

    • Buffer Overflow Exploit Development: Fuzzing

    • Buffer Overflow Exploit Development: Identify the position of EIP

    • Buffer Overflow Exploit Development: Overwriting the EIP

    • Buffer Overflow Exploit Development: Checking/Finding bad characters

    • Buffer Overflow Exploit Development: Finding the right module

    • Generating shellcode