Overview
Learn how to perform buffer overflows with ease in this course. The course covers topics such as spiking, fuzzing, finding offsets, overwriting the EIP, identifying bad characters, locating the right module, generating shellcode, and gaining root access. Additionally, Python 3 and TryHackMe Brainstorm Walkthrough are included. The teaching method involves a step-by-step approach with practical demonstrations. This course is intended for individuals interested in cybersecurity, ethical hacking, and penetration testing.
Syllabus
- Introduction.
- Downloading Our Materials.
- Buffer Overflows Explained.
- Spiking.
- Fuzzing.
- Finding the Offset.
- Overwriting the EIP.
- Finding Bad Characters.
- Finding the Right Module.
- Generating Shellcode & Gaining Root.
- Python 3 & More.
- TryHackMe Brainstorm Walkthrough.
Taught by
The Cyber Mentor