- Course
Buffer Overflow for Offensive Security Professionals
Master the art of exploiting buffer overflow vulnerabilities on Windows with Immunity Debugger and Kali Linux. This course will teach you the step-by-step buffer overflow exploitation skills needed for the OSCP exam.
- Course
Buffer Overflow for Offensive Security Professionals
Master the art of exploiting buffer overflow vulnerabilities on Windows with Immunity Debugger and Kali Linux. This course will teach you the step-by-step buffer overflow exploitation skills needed for the OSCP exam.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Many aspiring penetration testers find themselves overwhelmed by the multi-step process of exploiting buffer overflow vulnerabilities under exam conditions, struggling to move from a simple crash to a full, reliable shellcode attack. In this course, Buffer Overflow for Offensive Security Professionals, you’ll learn to systematically exploit Windows buffer overflow vulnerabilities from fuzzing to shellcode delivery. First, you’ll explore fundamental concepts like stack layout, DEP, ASLR, EIP, bad characters, and the basics of Immunity Debugger. Next, you’ll discover the critical workflow of fuzzing a vulnerable application, replicating crashes, finding EIP offsets, controlling execution flow, expanding padding space, and pinpointing bad characters. Finally, you’ll learn how to locate a JMP ESP gadget, craft and encode shellcode with msfvenom, and deploy a complete exploit from your Kali Linux machine. When you’re finished with this course, you’ll have the skills and knowledge of Windows buffer overflow exploitation needed for the OSCP exam.