A Stack Based and SEH Based Buffer Overflow Attack.
- Download the files and extract.
- Run the VulnerableServer.exe file.
- Run the exploit from another machine. Note: Change the IP Address of the victim before proceeding.
Also check the below link for more reference.
https://jagskap.blogspot.com/2021/10/buffer-overflow-overview-part-i.html
https://jagskap.blogspot.com/2021/10/buffer-overflow-creating-vulnerable-server-part-ii.html
https://jagskap.blogspot.com/2021/10/stack-based-buffer-overflow-exploit-part-iii.html
https://jagskap.blogspot.com/2021/10/seh-based-buffer-overflow-exploit-part-iv.html
https://jagskap.blogspot.com/2021/10/buffer-overflow-mitigation--recommendation-technique-part-v.html
https://jagskap.blogspot.com/2019/06/brainpan-buffer-overflow.html