This document discusses structured exception handling (SEH) exploitation on Windows. It explains how SEH works, the data structures involved like the exception registration record and thread information block. It describes how abusing SEH by overwriting pointers allows gaining code execution. The document provides steps to create a proof of concept exploit against a vulnerable ActiveX control by overflowing a buffer, overwriting the SEH pointers and injecting shellcode.