{"id":512,"date":"2026-01-17T19:46:15","date_gmt":"2026-01-17T19:46:15","guid":{"rendered":"https:\/\/rmfsales.com\/?p=512"},"modified":"2026-01-17T19:46:15","modified_gmt":"2026-01-17T19:46:15","slug":"hacking-22","status":"publish","type":"post","link":"https:\/\/rmfsales.com\/?p=512","title":{"rendered":"How to write a Windows 32-bit buffer overflow!"},"content":{"rendered":"<p>In this video we write a 32 bit buffer overflow together in python using tools like Immunity Debugger, Mona, and msfvenom. I show you how to:<\/p>\n<p>1.) Fuzz the application<br \/>\n2.) Determine the offset<br \/>\n3.) Control the eip cpu register<br \/>\n4.) Determine your bad characters (manually and using Mona)<br \/>\n5.) Find the jmp_esp<\/p>\n<p>As a bonus, I show you how you code your exploit to pop a shell in the same window that you run the exploit in!<\/p>\n<p>It&#8217;s a bit long but this isn&#8217;t exactly a fast process LOL!<\/p>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"How to write a Windows 32-bit buffer overflow!\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/WbAiSxs8c7c?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this video we write a 32 bit buffer overflow together in python using tools like Immunity Debugger, Mona, and msfvenom. I show you how to: 1.) Fuzz the application 2.) Determine the offset 3.) Control the eip cpu register 4.) Determine your bad characters (manually and using Mona) 5.)&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[72,53,48,7,67,27,73,44,10,54],"tags":[51,13,87,68,28,74,46,15,56],"class_list":["post-512","post","type-post","status-publish","format-standard","hentry","category-coding","category-ethical-hacking","category-hacking","category-linux","category-msfvenom","category-networking","category-python","category-security","category-tutorial","category-walkthrough","tag-cybersecurity","tag-linux","tag-malware-development","tag-msfvenom","tag-networking","tag-python","tag-security","tag-tutorial","tag-walkthrough"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=512"}],"version-history":[{"count":1,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/512\/revisions"}],"predecessor-version":[{"id":513,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/512\/revisions\/513"}],"wp:attachment":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}