About Lesson
β
Exploiting Stack-Based Buffer Overflow using Immunity.
β
Using pattern_create & pattern_offset from Metasploit to determine offsets.
β
Controlling EIP and redirecting execution flow to Shellcode.
π Practical Exercise: Exploiting a Buffer Overflow vulnerability in a weak application.