This video is for my “Exploit Development” class. It shows how a Metasploit bind shell payload changes RAM near the stack, making it easy to see why some padding is required for the payload to work. Complete instructions for such attacks are here:
The EIP shown at the start does not hit the NOP sled; it was originally injected as 0xbfffcf30 and I started the video several instructions into the explot
This is a bind shell, not a “reverse shell” — I used the wrong name in the narration.
“Constructure” should be “Construction”.
I suppose “Unzipping” should be “decoding”.
The background noise is a cart and a elevator operating near my seat in Barnes & Noble