We may have known the Automation program before, learning how to use the Automation program, but in the computer field there is a word called "0 loophole", such a loophole is how to find it? Some vulnerabilities can be remotely controlled by your computer, installation Trojan, to achieve this purpose, how they are remote control of your system? Today we are learning the most important of these types of attacks: buffer overflow, buffer overflow, we can control the target machine. Based on the content of this chapter, we already have such a way to discover the "0 loophole", the principle and method of discovery will be explained in this chapter.
Q Group AC kali Q Group: 108186516
1: Introduction to buffer overflow
2:windows Buffer Overflow-fuzzer
3:windows buffer overflow-POP3 fuzzy test
4:fuzzer-Test PASS command when receiving large amounts of data will overflow
5:fuzzer-find the exact overflow of 4 bytes
6:fuzzing Ideas
7:fuzzing-Generating Shellcode
8:linux Buffer overflow-fuzzing environment preparation
9:linux Buffer Overflow-fuzzing debugging
10:linux Buffer Overflow-fuzzing thought
11:linux buffer Overflow-find bad characters, prepare shellcode
12: Select and modify EXP-646.C, 643.c
13: Avoid harmful exp and post-exploit phase post exploitation introduction
14: Post-exploit phase post exploitation-using TFTP to transfer files
15: Post-exploit phase post exploitation-using VBScript, POWERSHELL, debug to transfer files
Video Address Http://edu.aqniu.com/course/296/lesson/list
Kali Combat-Buffer overflow