EXPLOIT RESEARCH MEGAPRIMER PART 8 EXPLOITING SEH

Description:

Welcome to Part 8 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have not already done so!Finally! After 1 hour of gruelling session in the basics of SEH, we have finally arrived! This video deals with the actual exploitation of an SEH overwrite. We will look at how to create Short Jump from the Next SEH Handler pointer to our Shellcode, and exploit the victim! We will also talk about SAFESEH and how this makes our task a bit difficult, but loopholes in the system allow us to still get through. We will also learn how to find modules which are not linked with the SAFESEH option and use them to exploit the system.
Exit mobile version