In this chapter, we started by covering the essentials of assembly in the context of exploit writing in Metasploit, the general concepts, and their importance in exploitation. We covered details of stack-based overflows, SEH-based stack overflows, and bypasses for protection mechanisms such as DEP in depth. We included various handy tools in Metasploit that aid the process of exploitation. We also looked at the importance of bad characters and space limitations.
Now, we can perform tasks such as writing exploits for software in Metasploit with the help of supporting tools, determining essential registers, methods to overwrite them, and defeating sophisticated protection mechanisms.
Feel free to perform the following set of exercises before proceeding with the next chapter:
- Try finding exploits on exploit-db.com which work only on Windows XP systems and make them usable...