O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Building up the exploit base

We are now familiar with most of the processes carried out during exploitation. We saw how debuggers work and we saw how we can find out the values in various registers after an overwrite has taken place. Therefore, let's now see that how we can finalize the writing process of the exploit using Metasploit and its various tools.

Calculating the buffer size

Let's continue with the Generating junk section that we discussed previously. Let's try to find the exact location of the crash and answer the unsolved questions in our mind about that approach. However, here we will use a different but similar application. You can find the reference link of the vulnerable application from the information box at the end of this section. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required