Buffer Overflow
Last updated
Last updated
There are several steps to successfully use Buffer Overflow to make it malicious. But the primary goal is to fill Buffer Space, EBP, and be able to manipulate the Return Address to our shellcode.
Spiking
Fuzzing
Finding the Offset
Ovewrite the EIP
Finding Bad Characters
Finding the Right Module
Generating Shellcode
Root!
If you need a test Windows 10 machine to test exploits, use iso from https://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise . Also recommend use Immunity Debugger and vulnserver .