Chapter 13. Windows Exploit Development
In this chapter, we will cover the following recipes:
- Windows memory layout
- Buffer overflow attacks with saved return pointer overwrites
- Structured Exception Handling (SEH)
- Egg hunters
In this chapter, we will cover the following recipes: