Binary Exploits with Python

Video Description

Create simple binary exploits with Python

About This Video

  • A comprehensive video tutorial which will get you up-and-running with code injection, the simplest sort of binary exploit
  • Find vulnerabilities, analyze a crash, create a crafted attack, and achieve remote code execution
  • Develop attacks that take a control of your server and examine the memory used by Linux programs
  • Exploit vulnerable services on Windows servers using memory corruption techniques

In Detail

A penetration tester who only knows how to use tools written by others is limited to old techniques. Learning to develop your own exploits will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.

This video course starts with high-level code injection, the simplest sort of exploit. It then explains binary exploits that allow you to skip past unwanted code, such as the password or product key tests, and add Trojan code. You will perform the exploit development process: finding a vulnerability, analyzing a crash in a debugger, creating a crafted attack, and achieving remote code execution on Windows and Linux. You will use the gdb debugger to analyze Linux executables and Python code to exploit them. On Windows, you'll use the Immunity debugger and Python.

Product Information

  • Title: Binary Exploits with Python
  • Author(s): Sam Bowne
  • Release date: September 2018
  • Publisher(s): Packt Publishing
  • ISBN: 9781788398343