Hi everyone!
A little while ago, we posted a first video covering Corelan's Exploit Writing Tutorial Part 1.
Today, we're back with a second video in the series on exploit development, covering Exploit Writing Tutorial Part 2
In this second video, we'll be re-using the stack-based-overflow exploit from the first tutorial along with the Windows 11 x64 environment it was developed for.
By the end of the tutorial, you will have learned:
We'll also be using tools such as WinDBG and mona.py throughout the process - all based on the original Corelan workflow, but using modern systems and tooling.
If you need help setting up and using WinDBG, please take a moment to review this post.
Also, feel free to use the CorelanVMInstall.ps1 script from the CorelanTraining Github repo script to help set up WinDBG, Python, Visual Studio Express and other tools on your Windows 11 machine.
You can watch the video here:
© Corelan Consulting BV. All rights reserved. The contents of this page may not be reproduced, redistributed, or republished, in whole or in part, for commercial or non-commercial purposes without prior written permission from Corelan Consulting bv. See our Terms of Use & Privacy Policy (https://www.corelan.be/index.php/legal) for more details.
Subscribe to get the latest posts sent to your email.
Type your email…
Subscribe
wetw0rk is a security researcher passionate about exploit and malware development and an avid open-source contributor. He’s the creator of the Sickle Payload Development Kit and has worked on projects including Metasploit, Exploit-DB, and Kali Linux, with experience in red teaming, reverse engineering, and adversary emulation.
Tags:
Your email address will not be published. Required fields are marked *
Comment *
Name *
Email *
Website
Notify me of new posts by email.
Post Comment
Δ
This site uses Akismet to reduce spam. Learn how your comment data is processed.