Exploi'ng
Simple
Buffer
Overflows
on
Win32
Vivek
Ramachandran
SWSE,
SMFE,
SPSE,
SISE,
SLAE,
SGDE
Course
Instructor
Cer'fica'ons:
hNp://www.securitytube-‐training.com
Pentester
Academy:
hNp://www.PentesterAcademy.com
©SecurityTube.net
Exploi'ng
Echo
Server
v3
©SecurityTube.net
TCP
Echo
Server
v3
©SecurityTube.net
Exploita'on
Low
Memory
Low
Memory
NOP
SLED
Local
Variables
+
Others
Shellcode
EBP
(Frame
NOP
SLED
Pointer)
RETURN
Our
Code
Address
Address
0x11111111
-‐-‐-‐-‐-‐-‐-‐-‐-‐-‐-‐
-‐-‐-‐-‐-‐-‐-‐-‐-‐-‐-‐
High
Memory
-‐-‐-‐-‐-‐-‐-‐-‐-‐-‐-‐
High
Memory
©SecurityTube.net
Pentester
Academy
©SecurityTube.net