Quantcast
Channel: windows – Security Sift
Viewing all articles
Browse latest Browse all 8

Windows Exploit Development – Part 6: SEH Exploits

$
0
0

Introduction The buffer overflow exploits covered so far in this tutorial series have generally involved some form of direct EIP overwrite using a CALL or JMP instruction(s) to reach our shellcode. Today we’ll take a look at a different approach using Windows Structured Exception Handling (SEH). Before I begin explaining the basic mechanics of Windows Structured Exception Handling (as it’s implemented in an x86, 32-bit environment) it bears mentioning that...

The post Windows Exploit Development – Part 6: SEH Exploits appeared first on Security Sift.


Viewing all articles
Browse latest Browse all 8

Trending Articles