Pentester Academy - Exploiting Simple Buffer Overflows on Win32

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size3.9 GB
  • Uploaded ByxPaco1337
  • Downloads514
  • Last checkedJun. 15th '18
  • Date uploadedJun. 20th '17
  • Seeders 3
  • Leechers1

Infohash : F7868199A6403AE0445DA4BF5FE4EC98166A1E69

In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We will be taking over 10+ real world and staged application examples to illustrate the concepts. It is important to note that this introductory course will be looking at exploitation of buffer overflows in the absence of exploit mitigation techniques such as DEP and ASLR. We will be creating separate courses for these once we finish the basic courses.


Files:

Pentester Academy - Exploiting Simple Buffer Overflows on Win32 (2014)
  • 005-returning-to-shellcode.pdf (445.8 KB)
  • 017-jmp-call-eac-microp.pdf (451.2 KB)
  • 023-exploiting-file-sharing-server-part-2.mp4 (75.7 MB)
  • 027-exploiting-ftp-server-part-2.mp4 (57.9 MB)
  • 016-bad-chracter-hunting-microp.mp4 (186.2 MB)
  • minishare-1.4.1.exe.zip (87.7 KB)
  • Echo-Server-Memcpy (2).zip (280.0 KB)
  • AlteringExecution.zip (34.0 KB)
  • 003-stack-wind-unwind.mp4 (194.4 MB)
  • 029-course-conclusion.pdf (387.4 KB)
  • 007-overwriting-stack-remotely.pdf (449.0 KB)
  • 012-exploiting-echo-server-v3-part-2.mp4 (110.3 MB)
  • Echo-Server-Memcpy-v3.exe.zip (34.8 KB)
  • microp.zip (555.5 KB)
  • 028-automating-bad-char-detection.pdf (631.5 KB)
  • blazeexploit (2).zip (2.1 KB)
  • 012-exploiting-echo-server-v3-part-2.pdf (418.2 KB)
  • 004-tampering-return-address.pdf (410.4 KB)
  • Echo-Server-Memcpy (1).zip (280.0 KB)
  • 009-ret-control-to-code-execution.mp4 (185.3 MB)
  • 010-exploit-to-meterpreter.mp4 (56.9 MB)
  • 021-exploiting-digital-tv-player-part-2.pdf (532.2 KB)
  • 017-jmp-call-eac-microp.mp4 (118.7 MB)
  • 002-the-stack.mp4 (257.8 MB)
  • 001-course-introduction.mp4 (52.4 MB)
  • Echo-Server-Memcpy-v3.exe (1).zip (34.8 KB)
  • Echo-Server-Strcpy (2).zip (35.2 KB)
  • 019-exploiting-dvd-professional-part-2.mp4 (70.3 MB)
  • freesshd (1).zip (665.7 KB)
  • 011-exploiting-echo-server-v2.pdf (396.4 KB)
  • warftpd.zip (1.5 MB)
  • 016-bad-chracter-hunting-microp.pdf (450.6 KB)
  • 015-jmp-esp-technique.mp4 (99.5 MB)
  • minishare.zip (2.5 KB)
  • 007-overwriting-stack-remotely.mp4 (205.7 MB)
  • 014-strcpy-bad-characters.pdf (390.6 KB)
  • StackDemo.zip (33.9 KB)
  • 020-exploiting-digital-tv-player-part-1.mp4 (150.8 MB)
  • 026-exploiting-ftp-server-part-1.pdf (419.1 KB)
  • 021-exploiting-digital-tv-player-part-2.mp4 (58.0 MB)
  • 008-calculating-location-ret-overwrite.pdf (471.7 KB)
  • warftpd (1).zip (1.5 MB)
  • Echo-Server-Strcpy.zip (35.2 KB)
  • 011-exploiting-echo-server-v2.mp4 (178.9 MB)
  • 010-exploit-to-meterpreter.pdf (471.6 KB)
  • microp (1).zip (555.5 KB)
  • Echo-Server-Memcpy.zip (280.0 KB)
  • 029-course-conclusion.mp4 (21.6 MB)
  • 024-exploiting-ssh-server-part-1.mp4 (104.7 MB)
  • 009-ret-control-to-code-execution.pdf (470.7 KB)
  • 025-exploiting-ssh-server-part-2.mp4 (64.0 MB)
  • Echo-Server-Memcpy-v2.exe.zip (34.8 KB)
  • avisoft.zip (2.1 KB)
  • 005-returning-to-shellcode.mp4 (149.1 MB)
  • 012-exploiting-echo-server-v3-part-1.mp4 (156.8 MB)
  • Echo-Server-Bad-Char-Special.zip (280.5 KB)
  • 001-course-introduction.pdf (398.5 KB)
  • 022-exploiting-file-sharing-server-part-1.pdf (532.2 KB)
  • blazeexploit.zip (2.1 KB)
  • 024-exploiting-ssh-server-part-1.pdf (497.2 KB)
  • 013-bad-characters.pdf (405.9 KB)
  • 013-bad-characters.mp4 (190.8 MB)
  • 028-automating-bad-char-detection.mp4 (201.1 MB)
  • ExecShellcode.zip (34.3 KB)
  • avisoft (1).zip (2.1 KB)
  • 012-exploiting-echo-server-v3-part-1.pdf (418.1 KB)
  • 002-the-stack.pdf (412.2 KB)
  • 026-exploiting-ftp-server-part-1.mp4 (152.5 MB)
  • 004-tampering-return-address.mp4 (136.1 MB)
  • 020-exploiting-digital-tv-player-part-1.pdf (532.2 KB)
  • 018-exploiting-dvd-professional.mp4 (151.7 MB)
  • 006-overwriting-the-stack.pdf (394.3 KB)
  • 006-overwriting-the-stack.mp4 (201.2 MB)
  • 018-exploiting-dvd-professional.pdf (1.2 MB)
  • 025-exploiting-ssh-server-part-2.pdf (497.2 KB)
  • 027-exploiting-ftp-server-part-2.pdf (418.8 KB)
  • 008-calculating-location-ret-overwrite.mp4 (140.7 MB)
  • 019-exploiting-dvd-professional-part-2.pdf (1.2 MB)
  • StackDemoComplicated.zip (34.0 KB)
  • freesshd.zip (665.7 KB)
  • 014-strcpy-bad-characters.mp4 (147.7 MB)
  • OverwriteStack.zip (34.0 KB)
  • 022-exploiting-file-sharing-server-part-1.mp4 (97.0 MB)
  • 023-exploiting-file-sharing-server-part-2.pdf (401.2 KB)
  • 015-jmp-esp-technique.pdf (390.9 KB)
  • 003-stack-wind-unwind.pdf (387.6 KB)
  • Echo-Server-Memcpy (3).zip (280.0 KB)

Code:

  • http://bt4.t-ru.org/ann
  • http://retracker.local/announce