It's no secret that Offensive Security offers some of the best technical training in the information security field. Their brand has become synonymous with penetration testing in the eyes of most tech recruiters on LinkedIn.
Ensuring that we can detect and respond to a breach as soon as possible is critical to any good information security strategy. One of the simplest ways we can do this is to turn an attackers methodology against them with a honeypot!
In this article we will introduce the fundamentals of discovering and exploiting buffer overflow vulnerabilities in Windows applications.
In this article we will be doing a walkthrough of a really awesome vulnerable VM called Bulldog 2.