begood Posted June 2, 2010 Report Posted June 2, 2010 How to find vulnerabilities, write shellcode, exploit the vulnerability and finally turn it into a Metasploit exploit module! David Hoelzer is a Senior Fellow with the SANS Institute and author of the SANS Secure Coding in C/C++ course. He also regularly teaches incident handling, forensics and IT Audit courses for SANS: SANS: Auditing Networks, Perimeters, and SystemsFor the source code used in this demonstration, go here: http://www.enclaveforensics.com/Blog/files/e6fb7327cb615688f90fc07656a3880d-28.html Quote
Flubber Posted June 2, 2010 Report Posted June 2, 2010 Multumesc foarte mult. Ia sa vedem ce mai invatam si de data asta. Quote