Sept. 21, 2022, 5:59 p.m. | Guided Hacking

Guided Hacking www.youtube.com

Part 2 of our Binary Exploit Development Tutorial Series. We'll be showing you how to exploit a SEH based overflow. SEH is a Structed Exception Handler. A SEH based overflow is a buffer overflow that results in the hijacking of execution via a SEH chain.

Support us on GH: https://guidedhacking.com/register/
Support us on Patreon: https://patreon.com/guidedhacking
Support us on YT: https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw/join

This video was made by nop

SEH Based Overflow Article
https://guidedhacking.com/threads/binary-exploit-development-2-seh-based-overflow.20035/

Learn about the Windows Structured Exception Handler, as well …

binary development exploit exploit development overflow

IT Security Manager

@ Timocom GmbH | Erkrath, Germany

Cybersecurity Service Engineer

@ Motorola Solutions | Singapore, Singapore

Sr Cybersecurity Vulnerability Specialist

@ Health Care Service Corporation | Chicago Illinois HQ (300 E. Randolph Street)

Associate, Info Security (SOC) analyst

@ Evolent | Pune

Public Cloud Development Security and Operations (DevSecOps) Manager

@ Danske Bank | Copenhagen K, Denmark

Cybersecurity Risk Analyst IV

@ Computer Task Group, Inc | United States