Exploit writing tutorial part 3b : SEH Based Exploits – just another example
IhaveindicatedthatSEHneedstobeoverwrittenbyapointerto“poppopret”andthatnextSEHneedstobeoverwrittenwith6bytestojumpoverSEH…Ofcourse,thisstructurewasbasedonthelogicofmostSEHbasedvulnerabilities,andmores