This session covered the basic techniques of exploitation, some of these techniques may not work on latest operating system due various protections added into them. But these techniques are very crucial to understand the basic nature of exploit
Demo Video 1: EIP Overwrite
Demo Video 2: SEH Overwrite