O'Reilly logo

Python Penetration Testing Cookbook by Rejah Rehim

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

Here are the steps to create an exploit script for SEH attack:

  1. Start the Immunity Debugger in the Windows machine and attach the vulnerable application to it:
  1. Create a Python file called dvd_exploit.py to exploit or the DVD player and open it in your editor.
  2. As we are creating an exploit based on a file format, we will be creating a playlist file (.plf) with a long buffer in it and allow the DVD player to read it. Due to the long buffer, the DVD player will crash with the buffer overflow. So, the victim needs to open the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required