Buffer Overflow Preparation for OSCP

  1. Python exploit code
  2. Immunity debugger
  3. Mona for Immunity debugger
  1. Connection to the Debugging machine
  2. Fuzzing(Skip for OSCP)
  3. Identifying the EIP register offset value
  4. Controlling the EIP value
  5. Identifying the bad character
  6. Identifying the returning address
  7. Adding padding
  8. Generation a reverse shell with msfvenom
  9. Getting a shell

--

--

--

MSc in Cyber Security, OSCP and CEH Master certified. Awarded by Apple, Trello, Kraken... Connect me: https://www.linkedin.com/in/yevhenii-molchanov-aa565210b/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Numbers Matters

Swift Package Manager — Integrating resources

Agile for Product Managers: What to expect

Ralph Waldo Emerson once wrote, “Fear defeats more

Vector 2 Mod Apk 1.2.1 Unlimited Everything 2022

Interviewing for your first engineering job after a bootcamp

Journey in Life of eFishery Aqua Developer Software Engineer Participant — Day 1

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
YevhSec1

YevhSec1

MSc in Cyber Security, OSCP and CEH Master certified. Awarded by Apple, Trello, Kraken... Connect me: https://www.linkedin.com/in/yevhenii-molchanov-aa565210b/

More from Medium

Cyber Research #27

Weekly newsletter on Cybersecurity — Issue #1

5 Ways CISOs Can Improve Their Cyber Resilience

Hack The Box — Blue