SEH exploits require an understanding of how the SEH (Structured Exception Handler) works within a given application, so that the attacker can leverage that exception for a possible attack vector.

SEH Exploit

Writing exploits for Konica Minolta FTP Server

In this post, I will be writing an exploit for the 32-bit versions of the Konica Minolta FTP server for Windows. In a recent...
9 min read


I am currently updating the site, so posts will starting showing up from my previous blog very soon.