Upload

Loading icon Loading...

This video is unavailable.

From Fuzzing to Metasploit, Part 1/3

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like Andrew Whitaker's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike Andrew Whitaker's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add Andrew Whitaker's video to your playlist.

Uploaded on Jul 1, 2011

Walking you through the process of exploit development: fuzzing a vulnerable application, writing a stack-based buffer overflow remote exploit, porting the exploit to a Metasploit module, and using the exploit within Metasploit to perform VNC injection.

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

The interactive transcript could not be loaded.

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to