Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Science
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 3 hours on-demand video
  • 22 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
IT & Software Network & Security Exploit Development

Hands-on Fuzzing and Exploit Development

Learn the process of exploit development with real world examples
Rating: 4.5 out of 54.5 (63 ratings)
716 students
Created by Uday Mittal
Last updated 5/2019
English
30-Day Money-Back Guarantee

What you'll learn

  • Exploit Development
  • Basics of Buffer Overflow
  • Protocol and File Format Fuzzing
  • Hacking

Requirements

  • Have basic knowledge of Kali Linux, Fuzzing, Assembly language, Immunity Debugger

Description

About the course

This course will teach you the basics of exploiting a buffer overflow vulnerability. It follows the six stages of exploit development and gives a detailed walk-through of each. Each module starts by identifying the vulnerability via fuzzing. You'll learn both, protocol fuzzing (using Spike) and file format fuzzing (using FileFuzz). It then shows you how to create a PoC to trigger the vulnerability and convert that PoC into a working exploit.

Through this course you will get introduced to various tools such as Immunity Debugger, Mona library for Immunity Debugger, Metasploit, msfvenom, Spike, File Fuzz and much more.  This course is designed to be short and concise yet packed with practical knowledge.

Each video includes learning resources (in video) and associated files (pdf slides, fuzzing scripts, python script etc.). You can just follow along and create a working exploit. It's that simple.  Happy hacking!

What our fellow students say about this course

"Course goes from the basics through to what the OSCP teaches you. Highly recommended, still enjoying the material." - Michael Ross

"Best course I have taken thus far that explains buffer overflows in a way that you can easily try on your own home lab. Instructor is easy to understand, doesn't rush through the material and explains step - by - step." - William Daugherty

"Awesome course; clear and to-the-point; very helpful for understanding Buffer Overflow..." - Zeeshan


Who this course is for:

  • Students curious about ethical hacking, fuzzing, exploit development

Course content

3 sections • 19 lectures • 2h 48m total length

  • Preview03:23
  • Fuzzing
    07:34
  • PoC Creation
    06:37
  • Controlling the execution
    11:23
  • Bad character analysis
    07:26
  • Cracking the shell
    06:53
  • Develop a working exploit for JetAudio jetCast Server 2.0
    3 questions

  • Preview04:21
  • Fuzzing
    07:53
  • PoC Creation
    11:03
  • Controlling the execution
    11:56
  • Bad character analysis
    10:14
  • Cracking the shell
    07:08
  • Develop a working exploit for DeviceViewer 3.12.0.1
    3 questions

  • Preview03:16
  • Fuzzing
    13:02
  • PoC Creation
    03:52
  • Controlling the Execution
    15:48
  • Bad character analysis
    11:02
  • Cracking the shell - Stage 1
    16:25
  • Cracking the shell - Stage 2
    09:41

Instructor

Uday Mittal
Co-Founder at ElliteDevs & Yaksas CSC
Uday Mittal
  • 4.4 Instructor Rating
  • 178 Reviews
  • 5,315 Students
  • 3 Courses

Uday Mittal (OSCE, OSCP, CRTP, CISSP, CISA, CISM, CRISC, DCPP) is the founder of Yaksas CSC.  He has over 6 years of experience in dealing with various issues related  to cyber security. He is actively working towards educating people on  cyber security risks and steps to mitigate them. His areas of interest include  exploitation research, malware analysis, red teaming, VAPT  etc.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.