| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team PyCommand Plugin for Immunity Debugger, will assist exploit developers with writing better exploits, in a shorter amount of time. Note: Although not employed by Rapid7, we will mention “Metasploit” a lot. While we don’t expect a free copy of Metasploit Pro, It wont hurt our feelings. Just saying.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast