A Stack Based and SEH Based Buffer Overflow Attack.
- Download the files and extract.
- Run the VulnerableServer.exe file.
- Run the exploit from another machine. Note: Change the IP Address of the victim before proceeding.
Also check the below link for more reference.
https://radiojitter.wordpress.com/2018/04/16/buffer-overflow-exploit-part-1/
https://radiojitter.wordpress.com/2018/04/16/buffer-overflow-exploit-part-2/
https://www.radiojitter.com/buffer-overflow-exploit-part-2/
https://www.radiojitter.com/buffer-overflow-exploit-part-4/
https://www.radiojitter.com/buffer-overflow-exploit-part-5/
https://www.radiojitter.com/buffer-overflow-mitigation-part-6/
https://jagskap.blogspot.com/2019/06/brainpan-buffer-overflow.html