The absolute basics of exploitation

In this section, we will look at the most critical components required for exploitation. We will discuss a wide variety of registers supported in different architectures. We will also discuss the Extended Instruction Pointer (EIP) and Extended Stack Pointer (ESP), and their importance in writing exploits. We will also look at No Operation (NOP) and Jump (JMP) instructions and their significance in writing exploits for various software.

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.