null Global Committee elections are coming up! See the election repository for more information.

Abstract

In the Windows Exploit Development Humla Training session, you will learn how to write your own code for memory corruption exploits.
The module covers the following primary topics: -
Basics of Assembly Language
Control Flow and working of Stack
Vanilla Buffer overflow
Case study - 1
Case Study - 2
Identifying Bad Characters
JMP / CALL Technique
POP POP RET Technique
Overwriting SEH & nSEH

Speaker

Ravi Rajput

A Nerd, Geek and a noob completing his journey from noob to leet. Finding the solution to every problem from daily life to pentesting world.

Timing

Starts at Saturday April 27 2019, 11:00 AM. The sessions runs for about 7 hours.

Resources