Welcome to part 5! In this video we'll explore the concept of position independence and how shellcode can figure out where it lives in memory. We'll begin writing and debugging our shellcode!
Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
π Courses on Pluralsight ππ» https://www.pluralsight.com/authors/josh-stroschein
πΆοΈ YouTube ππ» Like, Comment & Subscribe!
ππ» Support my work ππ» https://patreon.com/JoshStroschein
π Follow me ππ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βοΈ Tinker with me on Github ππ» https://github.com/jstrosch
π€ Join the Discord community and more ππ» https://www.thecyberyeti.com
Download
0 formats
No download links available.
05 - Creating Position Independent Code using CALL $+5 | NatokHD