
Kali Linux - An Ethical Hacker's Cookbook
By :

You have learned the basics of exploitation earlier. Now let's try these on some of the software already exploited long ago and with public exploits available. In this recipe, you will learn about publicly available exploits for old software and create your own version of the exploit for it.
Before we begin, we will need an old version of a Windows OS (preferably, Windows XP) and a debugger for Windows. I have used Immunity Debugger and an old software with a known buffer overflow vulnerability. We will use Easy RM to MP3 Converter. This version had a buffer overflow vulnerability in playing large M3U files.
The free version of Immunity Debugger can be downloaded at https://www.immunityinc.com/products/debugger/.
Follow the given steps to learn about it: