Binary Exploits with Python [Video]

Code Files

Binary Exploits with Python [Video]

Sam Bowne

Create simple binary exploits with Python
Packt Subscription
FREE
$9.99/m after trial
Video
$106.25
RRP $124.99
Save 14%
What do I get with a Packt subscription?
  • Exclusive monthly discount - no contract
  • Unlimited access to entire Packt library of 6500+ eBooks and Videos
  • 120 new titles added every month, on new and emerging tech
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
$0.00
$106.25
$9.99 p/m after trial
RRP $124.99
Subscription
Video
Start a FREE 10-day trial

Frequently bought together


Binary Exploits with Python [Video] Book Cover
Binary Exploits with Python [Video]
$ 124.99
$ 106.25
Working with SQS and SNS: AWS with Python and Boto3 Series [Video] Book Cover
Working with SQS and SNS: AWS with Python and Boto3 Series [Video]
$ 36.99
$ 31.45
Buy 2 for $137.70
Save $24.28
Add to Cart

Video Description

A penetration tester who only knows how to use tools written by others is limited to old techniques. Learning to develop your own exploits will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.

This video course starts with high-level code injection, the simplest sort of exploit. It then explains binary exploits that allow you to skip past unwanted code, such as the password or product key tests, and add Trojan code. You will perform the exploit development process: finding a vulnerability, analyzing a crash in a debugger, creating a crafted attack, and achieving remote code execution on Windows and Linux. You will use the gdb debugger to analyze Linux executables and Python code to exploit them. On Windows, you'll use the Immunity debugger and Python.

Style and Approach

This course uses a demonstration-and-challenge approach which guides students from passive observation to practical implementation of binary exploit at development techniques.

Video Preview

What You Will Learn

  • Remove unwanted code such as the password or product key tests, and add Trojan code
  • Analyze simple Windows executable files and modify them using the Immunity Debugger
  • Write Python Scripts to perform exploits
  • Analyze simple Linux executable files and modify them using the gdb debugger

Authors

Video Details

ISBN 139781788398343
Course Length2 hours 53 minutes
Read More

Read More Reviews

Recommended for You

Working with SQS and SNS: AWS with Python and Boto3 Series [Video] Book Cover
Working with SQS and SNS: AWS with Python and Boto3 Series [Video]
$ 36.99
$ 31.45
Data Visualization Recipes with Python and Matplotlib 3 [Video] Book Cover
Data Visualization Recipes with Python and Matplotlib 3 [Video]
$ 124.99
$ 106.25
Machine Learning for Algorithmic Trading Bots with Python [Video] Book Cover
Machine Learning for Algorithmic Trading Bots with Python [Video]
$ 124.99
$ 106.25
High-Performance Computing with Python 3.x [Video] Book Cover
High-Performance Computing with Python 3.x [Video]
$ 124.99
$ 106.25
Work with RDS and DynamoDB: AWS with Python and Boto3 Series [Video] Book Cover
Work with RDS and DynamoDB: AWS with Python and Boto3 Series [Video]
$ 62.99
$ 53.55
RDS PostgreSQL and DynamoDB CRUD: AWS with Python and Boto3 [Video] Book Cover
RDS PostgreSQL and DynamoDB CRUD: AWS with Python and Boto3 [Video]
$ 54.99
$ 46.75