Protection techniques
Identification
Finding EIP
Finding a JMP ESP
Finding bad characters
Injecting a shellcode