O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we covered the essentials of assembly in context to exploit writing, the general registers such as EIP and ESP, and their importance in exploitation. Then, we covered the methods of finding out the buffer size and ways to point to the ShellCode and managing ESP. We looked at various scripts in Perl and Ruby, and then we looked at the importance of bad characters and space limitations. Now, we are able to perform the tasks such as writing exploits for software in Metasploit with the help of supporting tools, using debuggers, determining important registers and methods to overwrite them, and exploiting sophisticated SEH-based exploits.

In the next chapter, we will look at publically available exploits that are currently not ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required