Summary

In this chapter, we covered the essentials of assembly in context to exploit writing, the general registers such as EIP and ESP, and their importance in exploitation. Then, we covered the methods of finding out the buffer size and ways to point to the ShellCode and managing ESP. We looked at various scripts in Perl and Ruby, and then we looked at the importance of bad characters and space limitations. Now, we are able to perform the tasks such as writing exploits for software in Metasploit with the help of supporting tools, using debuggers, determining important registers and methods to overwrite them, and exploiting sophisticated SEH-based exploits.

In the next chapter, we will look at publically available exploits that are currently not ...

Get Mastering Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.