Back to Browse

Return Oriented Programming

2.4K views
Nov 21, 2020
1:06:58

In previous weeks, we've gone over techniques like shellcoding to inject our own malicious code into an executable, but many of these techniques have been countered by modern mitigations. Today, we'll be going over how we can REUSE code which already exists within a binary to execute our own arbitrary computations

Download

0 formats

No download links available.

Return Oriented Programming | NatokHD