Hi everyone!
A little while ago, we posted a first video covering Corelan's Exploit Writing Tutorial Part 1.
Today, we're back with a second video in the series on exploit development, covering Exploit Writing Tutorial Part 2
In this second video, we'll be re-using the stack-based-overflow exploit from the first tutorial along with the Windows 11 x64 environment it was developed for.
By the end of the tutorial, you will have learned:
We'll also be using tools such as WinDBG and mona.py throughout the process - all based on the original Corelan workflow, but using modern systems and tooling.
If you need help setting up and using WinDBG, please take a moment to review this post.
Also, feel free to use the
You can watch the video here:
© Corelan Consulting BV. All rights reserved. The contents of this page may not be reproduced, redistributed, or republished, in whole or in part, for commercial or non-commercial purposes without prior written permission from Corelan Consulting bv. See our Terms of Use & Privacy Policy (https://www.corelan.be/index.php/legal) for more details.