Nytro Posted November 6, 2011 Report Posted November 6, 2011 Overflow Exploitation, Step By Step Uploaded by DHAtEnclaveForensics on Nov 3, 2011I previously had this chopped up into pieces that were pretty hard to watch. Now that I'm allowed to have videos longer than 15 minutes, I thought I'd give you the un-cut version! Here's the entire 1 hour talk from beginning to end. Links to the source code for the server being compromised and a blog entry can be found here: Metasploit Exploit Creation, Step By Step | Security, buffer overflow, exploits, Vulnerability, Metasploit, Tutorial | Enclave ForensicsFor other great short videos, try AuditcastsDurata: 01:04:57Video:http://www.youtube.com/watch?v=8xonDJe3YxI&feature=youtube_gdata Quote