Summary
In this chapter, we started by covering the essentials of computing in the context of exploit writing in Metasploit, the general concepts, and their importance in exploitation. We covered details of stack-based overflows, SEH-based stack overflows, and bypasses for protection mechanisms such as DEP in depth. We included various handy tools in Metasploit that aid the process of exploitation. We also looked at the importance of bad characters and space limitations.
Now, we can perform tasks such as writing exploits for software in Metasploit with the help of supporting tools, determining essential registers and methods to overwrite them, and defeating sophisticated protection mechanisms.
In the next chapter, we will look at publicly available exploits that are currently not available in Metasploit. We will try porting them to the Metasploit framework.