Chapter 10Windows Exploit Development Basics

This chapter will walk you through the process of developing a simple stack-based overflow exploit on Windows; though there is a lot to exploit development this should be a great place to get started. The key behind the exploit development process is to replace the programs instructions with our instructions. This could be accomplished by making the program crash or making it behave in an unexpected manner and therefore overwriting the memory segments with our own piece of code which otherwise is known as Shellcode.

There are many types/classes of memory corruption such as buffer overflows and use-after-free. In this chapter we will focus on stack-based overflows, which are part of buffer overflows. ...

Get Ethical Hacking and Penetration Testing Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.