twitch (1).png
youtube (1).png
twitter (1).png

Hello everyone!  I thought it would be helpful to provide a walkthrough of a 32-bit Windows buffer overflow. For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around. My goal is that by the end of this tutorial, the average reader will have a clearer understanding and less fear of buffer overflows.

Course Materials

Part 1: Introduction

Part 2: Spiking

Part 3: Fuzzing

Part 4: Finding the Offset

Part 5: Overwriting the EIP

Part 6: Finding Bad Characters

Part 7: Finding the Right Module

Part 8: Generating Shellcode and Gaining Shells