BUFFER OVERFLOWS MADE EASY
Hello everyone! I thought it would be helpful to provide a walkthrough of a 32-bit Windows buffer overflow. For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around. My goal is that by the end of this tutorial, the average reader will have a clearer understanding and less fear of buffer overflows.
Course Materials
Part 1: Introduction
Part 2: Spiking
Part 3: Fuzzing
Part 4: Finding the Offset
Part 5: Overwriting the EIP
Part 6: Finding Bad Characters
Part 7: Finding the Right Module
Part 8: Generating Shellcode and Gaining Shells