Exploit Writing Tutorial Part 1 - The Video
嗯,用户发来了一段英文文章,然后让我用中文总结一下内容,控制在100字以内。看起来用户可能是个学生或者安全研究人员,对漏洞利用开发感兴趣。他可能想要快速了解文章的主要内容,而不需要逐字阅读。 首先,我需要通读整篇文章,抓住关键点。文章主要介绍了Corelan团队将他们的经典漏洞利用教程转化为视频系列的计划。特别是第一部分是关于Windows 11 x64环境下的堆栈溢出攻击。视频中使用了WinDBG和mona.py等工具,并且强调了理论与实践的结合。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖主要行动(视频系列启动)、核心人物(Peter Van Eeckhoutte)、教程的内容(堆栈溢出攻击)以及工具和目标受众(安全研究人员)。同时,保持语言简洁明了。 可能会遇到的问题是如何在有限的字数内准确传达所有关键信息。比如,是否需要提到现代系统和工具?或者是否要强调这是对原教程的扩展而非替代?这些都是需要权衡的地方。 最后,确保总结流畅自然,没有语法错误,并且符合用户的要求——不以“文章内容总结”等开头,直接描述内容。 </think> Corelan团队将经典漏洞利用教程转化为视频系列,首期聚焦Windows 11 x64环境下的堆栈溢出攻击,结合现代工具如WinDBG和mona.py,帮助安全研究人员将理论付诸实践。 2026-4-2 13:31:0 Author: www.corelan.be(查看原文) 阅读量:12 收藏

Print Friendly, PDF & Email

Hi everyone,

We are super excited and proud to announce the start of a great initiative.

17 years ago, Peter Van Eeckhoutte (aka corelanc0d3r) began publishing his exploit development tutorials on the Corelan website.

Those tutorials were groundbreaking and paved the way for how entire generations of security researchers learned exploit development.  They became a global reference point for both aspiring and experienced exploit developers, and even for trainers building their own courses. His work has been cited in books, referenced in research, and quietly influenced how people approach vulnerability analysis and exploitation at a fundamental level.

Even today — despite changes in operating systems, mitigations, and tooling — the underlying techniques documented in those blog posts remain highly relevant.

And yet, one question kept coming back:

“Can we see this in action?  Can you make a video so we can follow along?”

🎥 Bringing Corelan to Life

So we decided to do exactly that.

I’ve teamed up with Corelan to turn these legendary write-ups into a video-based series, where we walk through the original material step by step — but this time, live, visual, and on modern systems.

This is not a replacement for the original content, it’s an extension. A way to bridge theory and execution.

🚀 Part 1 — Stack-Based Buffer Overflows (Windows 11 x64)

We’re kicking things off with Part 1 of the original series:

👉 Exploit Writing Tutorial Part 1

In the first video, we exploit a stack-based buffer overflow on a modern Windows 11 x64 environment.

By the end of the tutorial, you will have learned:

  • What a stack-based buffer overflow really is
  • The role of registers and key assembly instructions
  • How to identify the steps and strategy to go from memory corruption to building an exploit
  • How to find and use reliable trampoline pointers
  • When and how to deploy shellcode
  • How to turn a proof of concept into a working exploit

We’ll also be using tools such as WinDBG and mona.py throughout the process — all based on the original Corelan workflow, but using modern systems and tooling.

If you need help setting up and using WinDBG, please take a moment to review this post.  Also, feel free to use the CorelanVMInstall.ps1 script to help set up WinDBG, Python, Visual Studio Express and other tools on your Windows 11 machine.

The video

You can watch the video here:

🔜 What’s Next

This is just the beginning.

More parts of the Corelan tutorial series will be covered — each building further on the previous one, and gradually moving into more advanced territory.

🙏 Final Thoughts

It’s an honor to collaborate on material that has helped shape so many careers in this field.

If you’ve ever read the Corelan tutorials and wanted to see them unfold in real time — this is for you.

If your interested in diving even deeper into this subject matter, Corelan also offers more in-depth training with topics more advanced than those we’ll be going through within this series.   Corelan classes prep you for the unique Corelan Certified Exploit Developer exam.

If you're interested in taking a Corelan Training in the US, hosted by CCST, follow this link to sign up and get a $200 voucher.

Fan of the Corelan wallpapers used in the video? Get them here!

Sponsor me <3: https://github.com/sponsors/wetw0rk

More to come.

— Milton (wetw0rk)


I hope you found this useful 🙏🏻 🤗

© Corelan Consulting BV. All rights reserved. ​The contents of this page may not be reproduced, redistributed, or republished, in whole or in part, for commercial or non-commercial purposes without prior written permission from Corelan Consulting bv. See our Terms of Use & Privacy Policy (https://www.corelan.be/index.php/legal) for more details.



文章来源: https://www.corelan.be/index.php/2026/04/02/exploit-writing-tutorial-part-1-the-video/
如有侵权请联系:admin#unsafe.sh