Nov. 10, 2023, 4 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Welcome to part 5 of this video series! In this video, we'll discuss what happens after the stack pivot and explore executing code on the stack. We'll also discuss data execution prevention (DEP) and it's impact on our exploitation attempts.

Looking for more content on IDA Pro, check out my course at Pluralsight: https://www.pluralsight.com/courses/ida-pro-concepts-basic-functionality or any of my other courses: https://www.pluralsight.com/authors/josh-stroschein

Videos in this series:
Part 1 - What is a Stack Buffer Overflow? Exploring How To Exploit the Stack …

arbitrary code code code execution data discuss exploitation impact pivot prevention series stack video videos

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC