Windows Buffer Overflow

Discovering the Vulnerability

Fuzzing the HTTP Protocol

Win32 Buffer Overflow Exploitation

A Word About DEP, ASLR, and CFG

Replicating the Crash

Controlling EIP

Locating Space for Our Shellcode

Checking for Bad Characters

Redirecting the Execution Flow

Finding a Return Address

Generating Shellcode with Metasploit

Getting a Shell

Improving the Exploit


Relevant Note(s): Buffer Overflow