Skip to Content
Ethical Hacking and Penetration Testing Guide
book

Ethical Hacking and Penetration Testing Guide

by Rafay Baloch
September 2017
Beginner
532 pages
13h 31m
English
Auerbach Publications
Content preview from Ethical Hacking and Penetration Testing Guide

Chapter 10Windows Exploit Development Basics

This chapter will walk you through the process of developing a simple stack-based overflow exploit on Windows; though there is a lot to exploit development this should be a great place to get started. The key behind the exploit development process is to replace the programs instructions with our instructions. This could be accomplished by making the program crash or making it behave in an unexpected manner and therefore overwriting the memory segments with our own piece of code which otherwise is known as Shellcode.

There are many types/classes of memory corruption such as buffer overflows and use-after-free. In this chapter we will focus on stack-based overflows, which are part of buffer overflows. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781351381345