Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Jul 1, 2011
Walking you through the process of exploit development: fuzzing a vulnerable application, writing a stack-based buffer overflow remote exploit, porting the exploit to a Metasploit module, and using the exploit within Metasploit to perform VNC injection.