This document discusses structured exception handling (SEH) and exploitation techniques. It provides background on SEH, how it is used to handle exceptions in Windows, and protections like SafeSEH. It then describes exploiting a vulnerability found through fuzzing the BigAnt Messenger Server application by overwriting SEH pointers and injecting shellcode. Exploitation steps include understanding the application, finding a crash through fuzzing, removing bad characters, and developing an exploit to gain control.