Description: We wrap up our buffer overflow exploit and make it execute a shell for us. We also recap what happened to spawn the shell code and some of the implications. I introduce the Corelan tutorial serieis aswell.
External Links:
Exploit Tutorial by Corelan Team
http://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
Presentation by Corelan Team at DerbyCon
http://www.irongeek.com/i.php?page=videos/derbycon1/peter-van-eeckhoutte-and-elliot-cutright-win32-exploit-development-with-mona-and-the-metasploit-framework
Part 1: http://youtu.be/8S0SqXIGv98
Tags: exploit , buffer overflow , stack , shellcode ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thank you for taking the time to create this series. I've read Peter's series on corelan.be but it's always easier to see it in action. Your explanation of what was happening, and why, was clear. It was funny to see that the shellcode didn't work ... but then you explained what had gone wrong. I just wondered if you had done it on purpose!
I'm looking forward to your further video contributions to our community.
I sure didnt do it on purpose, but it's good it happened. Happens to me alot, and I'm sure I'm not alone there. Very glad you enjoyed the videos , next I'll exploit the format string, ( as I really need the review too!) . Thanks!
Thx Fuzzy Nop, I checked your youtube channel, very informative, thx for your effert, nice to see your posts.
Excellent thanks a lot FuzzyNop.... Great serie