https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/ http://resources.infosecinstitute.com/bypassing-seh-protection-a-real-life-example/