Abstract

In the Windows Exploit Development Humla Training session, you will learn how to write your own code for memory corruption exploits.
The module covers the following primary topics: -
Basics of Assembly Language
Control Flow and working of Stack
Vanilla Buffer overflow
Case study - 1
Case Study - 2
Identifying Bad Characters
JMP / CALL Technique
POP POP RET Technique
Overwriting SEH & nSEH

Speaker

Ravi Rajput

A Nerd, Geek and a noob completing his journey from noob to leet. Finding the solution to every problem from daily life to pentesting world.

Timing

Starts at Saturday April 27 2019, 11:00 AM. The sessions runs for about 7 hours.

Resources