O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. The Exploit Formulation Process

Exploit formulation is all about how exploits are made and what they are actually made of. In this chapter, we will cover various vulnerabilities and will try to develop approaches and methods to exploit these vulnerabilities. In addition to that, our primary focus will be on building exploit modules for Metasploit. We will also cover a wide variety of tools that will aid exploit writing in Metasploit. However, an important aspect of exploit writing is the basics of assembly language. If we do not cover the basics of assembly, we will not be able to understand how things actually work. Therefore, let's first start a discussion about the assembly language and the essentials required to write exploits from ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required