Win32 Exploit Development With Mona and the Metasploit Framework

DerbyCon 1 - 2011

Presented by: Elliott Cutright (Nullthreat), Peter Van Eeckhoutte (corelanc0d3r)
Date: Sunday October 02, 2011
Time: 10:00 - 10:50
Location: Track 1

In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team PyCommand Plugin for Immunity Debugger, will assist exploit developers with writing better exploits, in a shorter amount of time. Note: Although not employed by Rapid7, we will mention “Metasploit” a lot. While we don’t expect a free copy of Metasploit Pro, It wont hurt our feelings. Just saying’.

Peter Van Eeckhoutte

Founder of Corelan Team and author of various Win32 exploit development tutorials and articles. Peter will be assisted by some of the Corelan Team members, making this training truly unique. The team will work with the students during the training and labs, assist them while they are working on the numerous exercises, and will share exploit development tips & tricks / experiences that were gathered over the years.

Elliott Cutright

CoreLan team.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats