Windows Exploits
In this section, we will learn to exploit Windows systems. We will start off slowly, building on previous concepts learned in the Linux chapters. Then we will take a leap into reality and work on a real-world Windows exploit.
Building a Basic Windows Exploit
Now that you’ve learned how to debug on Windows, how to disassemble on Windows, and about the Windows stack layout, you’re ready to write a Windows exploit! This section will mirror the Chapter 7 exploit examples that you completed on Linux to show you that the same kind of exploits are written the same way on Windows. The end goal of this section is to cause meet.exe to launch an executable of our choice based on shellcode passed in as arguments. We will use shellcode ...
Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.