Description: This exploit shows an example of how to jump back into shellcode if the space after the control pointer is less than the payload's size. This is extremely useful in case of SEH based windows exploits where there is no SafeSEH protected module other than the executable itself. However, the executable usually is loaded at addresses that start with zero and hence all the payload needs to be present before the shellcode hits the EIP pointer of control.
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.