ISAC Cambodia (InfoSec)
Video

EXPLOIT RESEARCH MEGAPRIMER PART 8 EXPLOITING SEH

Description:

Welcome to Part 8 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have not already done so!Finally! After 1 hour of gruelling session in the basics of SEH, we have finally arrived! This video deals with the actual exploitation of an SEH overwrite. We will look at how to create Short Jump from the Next SEH Handler pointer to our Shellcode, and exploit the victim! We will also talk about SAFESEH and how this makes our task a bit difficult, but loopholes in the system allow us to still get through. We will also learn how to find modules which are not linked with the SAFESEH option and use them to exploit the system.

Show More

Phannarith

Mr. OU Phannarith is one of the well-known cybersecurity experts in Cambodia and the region. He is the founder of the first leading information security website (www.secudemy.com) in Cambodia. He has been invited to present in global conferences, forums, and seminars and he was awarded in Information Security Leadership Achievements (ISLA) in 2016 by (ISC)2 and in December 2012 as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Group (IDG). Mr. OU has been the Professor specializing in Cybersecurity.

Related Articles

Back to top button