<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Exploit Development on Fabrice's Blog</title><link>https://blog.redteamshell.com/tags/exploit-development/</link><description>Recent content in Exploit Development on Fabrice's Blog</description><generator>Hugo</generator><language>en</language><copyright>&lt;a href="https://creativecommons.org/licenses/by-nc/4.0/" target="_blank" rel="noopener">CC BY-NC 4.0&lt;/a></copyright><lastBuildDate>Mon, 26 May 2025 16:28:21 -0400</lastBuildDate><atom:link href="https://blog.redteamshell.com/tags/exploit-development/index.xml" rel="self" type="application/rss+xml"/><item><title>Understanding POP-POP-RET in SEH Exploits</title><link>https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/</link><pubDate>Mon, 26 May 2025 16:28:21 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/SEH_Blog.png" alt="Blog Picture">&lt;/p>
&lt;p>&lt;em>Part of the Exploit Development Module – Certified Cybersecurity Engineer (CCSE) – By Cyberwarfare Labs&lt;/em>&lt;/p>
&lt;hr>
&lt;h3 id="-table-of-contents">📚 Table of Contents&lt;/h3>
&lt;ol>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#introduction">Introduction&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#what-is-a-stack-overflow">What is a Stack Overflow?&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#understanding-structured-exception-handling-seh">Understanding Structured Exception Handling (SEH)&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#where-does-pop-pop-ret-come-in">Where Does POP-POP-RET Come In?&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#breaking-down-pop-pop-ret">Breaking Down POP-POP-RET&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#step-by-step-example-of-using-pop-pop-ret-in-an-seh-exploit">Step-by-Step Example of Using POP-POP-RET in an SEH Exploit&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#finding-a-suitable-pop-pop-ret-instruction">Finding a Suitable POP-POP-RET Instruction&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#example-exploit-code">Example Exploit Code&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#what-happens-when-we-run-the-exploit">What Happens When We Run the Exploit?&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#conclusion">Conclusion&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#next-steps">Next Steps&lt;/a>&lt;/li>
&lt;/ol>
&lt;hr>
&lt;h3 id="-introduction">🔰 Introduction&lt;/h3>
&lt;p>This blog post is part of the &lt;strong>Exploit Development&lt;/strong> module in my journey through the &lt;strong>Certified Cybersecurity Engineer (CCSE)&lt;/strong> certification by &lt;strong>Cyberwarfare Labs&lt;/strong>.&lt;/p></description></item></channel></rss>