begood Posted June 2, 2010 Report Share Posted June 2, 2010 How to find vulnerabilities, write shellcode, exploit the vulnerability and finally turn it into a Metasploit exploit module! David Hoelzer is a Senior Fellow with the SANS Institute and author of the SANS Secure Coding in C/C++ course. He also regularly teaches incident handling, forensics and IT Audit courses for SANS: SANS: Auditing Networks, Perimeters, and SystemsFor the source code used in this demonstration, go here: http://www.enclaveforensics.com/Blog/files/e6fb7327cb615688f90fc07656a3880d-28.html Quote Link to comment Share on other sites More sharing options...
Flubber Posted June 2, 2010 Report Share Posted June 2, 2010 Multumesc foarte mult. Ia sa vedem ce mai invatam si de data asta. Quote Link to comment Share on other sites More sharing options...