Summary
In this chapter, we covered the essentials of assembly in context to exploit writing, the general registers such as EIP and ESP, and their importance in exploitation. Then, we covered the methods of finding out the buffer size and ways to point to the ShellCode and managing ESP. We looked at various scripts in Perl and Ruby, and then we looked at the importance of bad characters and space limitations. Now, we are able to perform the tasks such as writing exploits for software in Metasploit with the help of supporting tools, using debuggers, determining important registers and methods to overwrite them, and exploiting sophisticated SEH-based exploits.
In the next chapter, we will look at publically available exploits that are currently not available in Metasploit. We will try porting them under the Metasploit framework.