In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We will be taking over 10+ real world and staged application examples to illustrate the concepts. It is important to note that this introductory course will be looking at exploitation of buffer overflows in the absence of exploit mitigation techniques such as DEP and ASLR. We will be creating separate courses for these once we finish the basic courses.
What are cookies?
Cookies are small pieces of text stored on your computer when you visit almost any website. Companies use them to:
- Verify your identity, to ensure your security and privacy
- Determine the browser and settings you are using to provide optimised content
- Understand the way you navigate through websites, so firms can make improvements
- Help site owners and third-party advertisers tailor content to your preferences
We also use social media buttons and/or plugins on this site that allow you to connect with your social network in various ways. For these to work the following social media sites including;
- Linked In
will set cookies through our site, which may be used to enhance your profile on their site or contribute to the data they hold for various purposes outlined in their respective privacy policies.
There are multiple levels of cookie enablement in Chrome. For more information, click here.