In this chapter, we will cover the following recipes:
- Exploiting stack-based buffer overflows
- Exploiting buffer overflow on real software
- SEH bypass
- Exploiting egg hunters
- An overview of ASLR and NX bypass
In this chapter, we will cover the following recipes: