Binary Exploits with Python [Video]

Code Files

Binary Exploits with Python [Video]

Sam Bowne
New Release!

Create simple binary exploits with Python
This title is available to pre-order now and is expected to be published in
Video
$10.00
RRP $124.99
Save 91%
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$10.00
RRP $124.99

Frequently bought together


Binary Exploits with Python [Video] Book Cover
Binary Exploits with Python [Video]
$ 124.99
$ 10.00
Selenium WebDriver With Python 3.x - Novice To Ninja [Video] Book Cover
Selenium WebDriver With Python 3.x - Novice To Ninja [Video]
$ 199.99
$ 10.00
Buy 2 for $20.00
Save $304.98
Add to Cart

Video Details

ISBN 139781788398343
Course Length2 to 3 hours

Video Description

A penetration tester who only knows how to use tools written by others is limited to old techniques. Learning to develop your own exploits will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.
This video course starts with high-level code injection, the simplest sort of exploit. It then explains binary exploits that allow you to skip past unwanted code, such as the password or product key tests, and add Trojan code. You will perform the exploit development process: finding a vulnerability, analyzing a crash in a debugger, creating a crafted attack, and achieving remote code execution on Windows and Linux. You will use the gdb debugger to analyze Linux executables and Python code to exploit them. On Windows, you'll use the Immunity debugger and Python.

Style and Approach

This course uses a demonstration-and-challenge approach which guides students from passive observation to practical implementation of binary exploit at development techniques.

Table of Contents

What You Will Learn

  • Remove unwanted code such as the password or product key tests, and add Trojan code
  • Analyze simple Windows executable files and modify them using the Immunity Debugger
  • Write Python Scripts to perform exploits
  • Analyze simple Linux executable files and modify them using the gdb debugger

Authors

Table of Contents

Video Details

ISBN 139781788398343
Course Length2 to 3 hours
Read More

Read More Reviews

These popular $10 titles might interest you

Selenium WebDriver With Python 3.x - Novice To Ninja [Video] Book Cover
Selenium WebDriver With Python 3.x - Novice To Ninja [Video]
$ 199.99
$ 10.00
Getting Started with Object-Oriented Programming in Python 3 [Video] Book Cover
Getting Started with Object-Oriented Programming in Python 3 [Video]
$ 124.99
$ 10.00
Applications of Statistical Learning with Python [Video] Book Cover
Applications of Statistical Learning with Python [Video]
$ 124.99
$ 10.00
Hands-On Test Driven Development with Python [Video] Book Cover
Hands-On Test Driven Development with Python [Video]
$ 124.99
$ 10.00
Learn Python in 3 Hours [Video] Book Cover
Learn Python in 3 Hours [Video]
$ 124.99
$ 10.00
Text Mining with Machine Learning and Python [Video] Book Cover
Text Mining with Machine Learning and Python [Video]
$ 124.99
$ 10.00