I'm having ecPPTv2 exam, and I successfully developed the exploit for the buffer overflow section, so I found offset, bad chars and the return address, i debugged with Immunity Debugger and It's all good, the rutn pointer is ok and no ASLR is active in that address BUT when I debug it as soon as i hit the start of my payload I get
Access violation when executing [ESP Address]
Initially I thought it was normal, 'cause I am running Immunity on a windows 11 machine but when I try to execute the program into the kali machine to attack the target I don't receive the connection back to my handler
I tried to change NOP, changereturn address but nothing worked
Can you help me?