This tutorial covers the development of a simple Buffer Overflow exploit from scratch, including everything from initial discovery, to a working Proof of Concept exploit, to a fully “weaponized” Metasploit module. It also includes the development of “fuzzing” tools to assist in exploit development. This tutorial is intended as a basic introduction to the world of exploit development.

Contents