How does SEH based exploit bypass DEP and ASLR?
I am new to structured exception handling based exploits.
Why don’t we put our return address directly in SE handler to jump to our shellcode? (with no safe SEH)
Can anybody explain the reason of using pop pop ret?
I read… Continue reading How does SEH based exploit bypass DEP and ASLR?