Podcast Episode Details

Back to Podcast Episodes
Writing Security Tools and Exploits

Writing Security Tools and Exploits



This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack and heap), format string vulnerabilities, and integer bugs. The text explains exploit development techniques, including shellcode creation and manipulation, and provides examples using assembly language and C. Additionally, it explores using Metasploit and Nessus, two security frameworks, to build and manage exploits, along with extending their capabilities through custom modules and scripts. Finally, it details how to extend Ethereal to support new file formats and protocols.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Writing-Security-Tools-Exploits-Foster/dp/1597499978?&linkCode=ll1&tag=cvthunderx-20&linkId=9b4e939ddd8e5d0384036a5e5d31a6ec&language=en_US&ref_=as_li_ss_tl



Published on 1 month, 3 weeks ago






If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate