0% found this document useful (0 votes)
63 views4 pages

JMP Esp Technique

This document discusses exploiting buffer overflows on Windows 32 systems. It begins by introducing the instructor Vivek Ramachandran and his certifications. Then it outlines three techniques for buffer overflow exploits: JMP ESP, which takes advantage of the JMP ESP instruction; a strcpy buffer overflow in TCP Echo Server v1.0; and concludes by mentioning the Pentester Academy for further training.

Uploaded by

MotivatioNet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views4 pages

JMP Esp Technique

This document discusses exploiting buffer overflows on Windows 32 systems. It begins by introducing the instructor Vivek Ramachandran and his certifications. Then it outlines three techniques for buffer overflow exploits: JMP ESP, which takes advantage of the JMP ESP instruction; a strcpy buffer overflow in TCP Echo Server v1.0; and concludes by mentioning the Pentester Academy for further training.

Uploaded by

MotivatioNet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Exploi'ng

 Simple  Buffer  Overflows  on  


Win32  

Vivek  Ramachandran  
SWSE,  SMFE,  SPSE,  SISE,  SLAE,  SGDE  Course  Instructor  

Cer'fica'ons:                          hNp://www.securitytube-­‐training.com    
 
Pentester  Academy:    hNp://www.PentesterAcademy.com    

©SecurityTube.net  
JMP  ESP  Technique  

©SecurityTube.net  
TCP  Echo  Server  v1.0  Strcpy  

©SecurityTube.net  
Pentester  Academy  

©SecurityTube.net  

You might also like