Binary Exploit Development - SEH Based Overflow

Subscribers:
178,000
Published on ● Video Link: https://www.youtube.com/watch?v=LzK9dM_K-FI



Duration: 10:17
7,232 views
0


Part 2 of our Binary Exploit Development Tutorial Series. We'll be showing you how to exploit a SEH based overflow. SEH is a Structed Exception Handler. A SEH based overflow is a buffer overflow that results in the hijacking of execution via a SEH chain.

Support us on GH: https://guidedhacking.com/register/
Support us on Patreon:   / guidedhacking  
Support us on YT:    / @guidedhacking  

This video was made by nop

SEH Based Overflow Article
https://guidedhacking.com/threads/bin...

Learn about the Windows Structured Exception Handler, as well as space restrictions and how to exploit and overcome them in the second part of the binary exploitation course. SEH based overflows are an alternative to direct return address overwrites and are considered to be more reliable but also require slightly more knowledge about exploit development and Windows internals.

Welcome to the 2nd part of my binary exploitation series. Next to a direct return address overwrite (which we exploited in part 1) the SEH chain can also be used to obtain control over the execution flow of a program and execute arbitrary code.

What is a Structured Exception Handler?​
What happens when your program does something it should definitely not do? Should the program just exit, should a message appear or should your computer turn off? An exception is an additional method to divert code flow when an exception occurs, that don't fall under normal error checking logic.

Structured Exception Handling is Microsoft's specific method of handling both software & hardware exceptions

Are these types of exceptions vulnerable? Not in themselves, no. But can you use a buffer overflow to overwrite part of SEH? Indeed you can, as you will find out in the video below. An SEH chain (linked list) exists on the stack for each thread, with pointers to each exception handler ( it's just a function pointer, not complicated). Overwriting one of these function pointers? Or the function itself? That's what we're doing in a SEH buffer overflow.

Stay tuned for more new videos in our Binary Exploit Development series.

Follow us on Facebook : http://bit.ly/2vvHfhk
Follow us on Twitter : http://bit.ly/3bC7J1i
Follow us on Twitch : http://bit.ly/39ywOZ2
Follow us on Reddit : http://bit.ly/3bvOB57
Follow us on GitHub : http://bit.ly/2HoNXIS
Follow us on Instagram : http://bit.ly/2SoDOlu

SoundFX and Music provided by:
Epidemic Sound https://epidemicsound.com
Zapsplat https://www.zapsplat.com
Audio Blocks https://www.audioblocks.com

tags:
SEH Based Overflow
exploit development tutorial
binary exploitation tutorial
SEH buffer overflow
exploit development
buffer overflow
binary exploitation

What is a buffer overflow?
What is a Structured Exception Handler?
What is a SEH based buffer overflow?
How does a Structured Exception Handler work?
#exploitdevelopment #reverseengineering #bufferoverflow







Tags:
SEH Based Overflow
SEH buffer overflow
binary exploit development
binary exploitation
binary exploitation tutorial
buffer overflow
exploit
exploit development
exploit development tutorial
guidedhacking
remote code execution