Windows Exploits

In this section, we will learn to exploit Windows systems. We will start off slowly, building on previous concepts learned in the Linux chapters. Then we will take a leap into reality and work on a real-world Windows exploit.

Building a Basic Windows Exploit

Now that you’ve learned how to debug on Windows, how to disassemble on Windows, and about the Windows stack layout, you’re ready to write a Windows exploit! This section will mirror the Chapter 7 exploit examples that you completed on Linux to show you that the same kind of exploits are written the same way on Windows. The end goal of this section is to cause meet.exe to launch an executable of our choice based on shellcode passed in as arguments. We will use shellcode ...

Get Gray Hat Hacking, Second Edition, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.