Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video

This article has 379 views

Hi everyone!

A little while ago, we posted a first video covering Corelan's Exploit Writing Tutorial Part 1.

Today, we're back with a second video in the series on exploit development, covering Exploit Writing Tutorial Part 2

In this second video, we'll be re-using the stack-based-overflow exploit from the first tutorial along with the Windows 11 x64 environment it was developed for.

By the end of the tutorial, you will have learned:

  • What jump code is
  • When and how to use jump code
  • How do develop custom jumpcode
  • Flow of exploitation depending on jump operations

We'll also be using tools such as WinDBG and mona.py throughout the process - all based on the original Corelan workflow, but using modern systems and tooling.

If you need help setting up and using WinDBG, please take a moment to review this post.

Also, feel free to use the CorelanVMInstall.ps1 script from the CorelanTraining Github repo script to help set up WinDBG, Python, Visual Studio Express and other tools on your Windows 11 machine.

The video

You can watch the video here:


I hope you found this useful 🙏🏻 🤗

© Corelan Consulting BV. All rights reserved. ​The contents of this page may not be reproduced, redistributed, or republished, in whole or in part, for commercial or non-commercial purposes without prior written permission from Corelan Consulting bv. See our Terms of Use & Privacy Policy (https://www.corelan.be/index.php/legal) for more details.



Discover more from Corelan | Exploit Development & Vulnerability Research

Subscribe to get the latest posts sent to your email.

About the author

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.