AI Adoption - Drive Business Value and Organizational Impact
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to deliver custom shellcode using Python in this 19-minute cybersecurity tutorial that demonstrates advanced stack buffer overflow exploitation techniques. Explore how to execute custom shellcode after performing a stack pivot, working with a different vulnerable program to broaden your practical experience in exploit development. Master the process of integrating Python-based shellcode delivery mechanisms into your exploitation workflow, building upon previous concepts of stack manipulation and arbitrary code execution. Gain hands-on experience with real-world exploitation scenarios while understanding the technical intricacies of post-pivot shellcode execution in cybersecurity contexts.
Syllabus
Executing Custom Shellcode after the Stack Pivot
Taught by
Dr Josh Stroschein