BoF explained

Well, it’s been a while since I’ve posted. Family and work are taking most of my time. Also started practicing with Exploit codes and Buffer Overflows. Taking an application with a known vulnerability, then starting with a working PoC writing an exploit from there.

I would love to take the time and write up my experiences in this matter, but seeing that there are hundreds of websites/posts on this subject, I’ll just post 2 of my favorites. Well written and very understandable.

Peter Van Eeckhoutte’s blog
i-Hacked.com ‘s article on SEH BoFs


Comments are closed.