This chapter will go through some Windows-based vulnerabilities and the exploit techniques using Python. The solution for the exploit development tasks is to replace the program instructions with our instructions to manipulate the application behavior. We will be using an Immunity Debugger for debugging the applications. As the victim machine will be a Windows machine, we require a machine with Window XP OS installed on it. We are using the old XP version for the ease of exploiting, and the sample applications with vulnerabilities will work in XP.
United States
United Kingdom
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Argentina
Austria
Belgium
Bulgaria
Chile
Colombia
Cyprus
Czechia
Denmark
Ecuador
Egypt
Estonia
Finland
Greece
Hungary
Indonesia
Ireland
Italy
Japan
Latvia
Lithuania
Luxembourg
Malaysia
Malta
Mexico
Netherlands
New Zealand
Norway
Philippines
Poland
Portugal
Romania
Singapore
Slovakia
Slovenia
South Africa
South Korea
Sweden
Switzerland
Taiwan
Thailand
Turkey
Ukraine