Exploit writing tutorial part 3 : SEH Based Exploits | Corelan Cybersecurity Research

In the first 2 parts of the exploit writing tutorial series, I have discussed how a classic stack buffer overflow works and how you can build a reliable exploit by using various techniques to jump to the shellcode. The example we have used allowed us to directly overwrite EIP and we had a pretty la…