Description: Walking you through the process of exploit development: fuzzing a vulnerable application, writing a stack-based buffer overflow remote exploit, porting the exploit to a Metasploit module, and using the exploit within Metasploit to perform VNC injection.
Tags: Hacking , Metasploit , fuzzer , SPIKE , exploit ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Great work, thanks buddy
great video..