O'Reilly logo

Ethical Hacking and Penetration Testing Guide by Rafay Baloch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10Windows Exploit Development Basics

This chapter will walk you through the process of developing a simple stack-based overflow exploit on Windows; though there is a lot to exploit development this should be a great place to get started. The key behind the exploit development process is to replace the programs instructions with our instructions. This could be accomplished by making the program crash or making it behave in an unexpected manner and therefore overwriting the memory segments with our own piece of code which otherwise is known as Shellcode.

There are many types/classes of memory corruption such as buffer overflows and use-after-free. In this chapter we will focus on stack-based overflows, which are part of buffer overflows. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required