Presented at
DerbyCon 1.0 (2011),
Oct. 2, 2011, 10 a.m.
(50 minutes).
In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team PyCommand Plugin for Immunity Debugger, will assist exploit developers with writing better exploits, in a shorter amount of time. Note: Although not employed by Rapid7, we will mention “Metasploit” a lot. While we don’t expect a free copy of Metasploit Pro, It wont hurt our feelings. Just saying’.
Presenters:
-
Peter Van Eeckhoutte / corelanc0d3r
as Peter Van Eeckhoutte (corelanc0d3r)
Founder of Corelan Team and author of various Win32 exploit development tutorials and articles. Peter will be assisted by some of the Corelan Team members, making this training truly unique. The team will work with the students during the training and labs, assist them while they are working on the numerous exercises, and will share exploit development tips & tricks / experiences that were gathered over the years.
-
Elliott Cutright / Nullthreat
as Elliott Cutright (Nullthreat)
CoreLan team.
Similar Presentations: