Month: May 2013

Exploit writing>>> SEH based!

Today i have re-exploited a software called mp3-nator. SEH based is bit challenging. I am going to show you quickly that how i exploited this SEH based vulnerable using only following tools: 1. Immunity Debugger.2. (Corelan).3. Metasploit(For  shellcode). 4. Vulnerable Application Access Violation! First going to make the application crashed(The classic way!). Before that …

Exploit writing>>> SEH based! Read More »