Binary Overflow Exploitation
Buffer overflows are used in many of the exploits that we use against vulnerable services, however most of these are pre-compiled by exploit developers. In this section users will learn the foundations of
- Windows buffer overflow vulnerabilities
- Basic exploit development
- Exploitation of services vulnerable to buffer overflow