💻
Pentesting cheatsheet
Ctrlk
  • Home
  • Passive Information Gathering
  • Network Exploitation
  • Active Directory
  • Thick Client
  • File Transfers
  • Password Attacks
  • Port Redirection and Tunneling
  • Windows stack-based Buffer Overflow
    • Initialization
    • Fuzzing
    • Finding the offset
    • Finding bad characters
    • Finding a jump point
    • Generating shellcode
    • Getting a shell
  • Metasploit
  • Post Exploitation
  • Web Stuff
  • K8S
  • CVE repository
Powered by GitBook
On this page

Windows stack-based Buffer Overflow

InitializationFuzzingFinding the offsetFinding bad charactersFinding a jump pointGenerating shellcodeGetting a shell
PreviousHTTPtunnelNextInitialization

Last updated 3 years ago