This whitepaper covers a new technique that utilizes DLL injection to inject a custom DLL into a running vulnerable process to add a POP POP RET sequence in the scenario that the vulnerable program does not include any null byte free sequences. This is a useful technique to exploit SEH buffer overflow attacks successfully.
74df8ee5ae7f9410a55a3ced1546454f896ed3cdd356c8ffd56a51dee01fc0db