Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Buffer Overflows Made Easy

Cyber Mentor via YouTube

Overview

Learn how to exploit 32-bit Windows buffer overflows effortlessly through spiking, fuzzing, offset identification, EIP overwriting, bad character detection, module identification, and shellcode generation. This course is designed for individuals interested in cybersecurity and ethical hacking.

Syllabus

Buffer Overflows Made Easy - Part 1: Introduction.
Buffer Overflows Made Easy - Part 2: Spiking.
Buffer Overflows Made Easy - Part 3: Fuzzing.
Buffer Overflows Made Easy - Part 4: Finding the Offset.
Buffer Overflows Made Easy - Part 5: Overwriting the EIP.
Buffer Overflows Made Easy - Part 6: Finding Bad Characters.
Buffer Overflows Made Easy - Part 7: Finding the Right Module.
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells.

Taught by

The Cyber Mentor

Reviews

Start your review of Buffer Overflows Made Easy

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.