all InfoSec news
A step-by-step introduction to the use of ROP gadgets to bypass DEP
Malware Analysis, News and Indicators - Latest topics malware.news
Summary
DEP (Data Execution Prevention) is a memory protection feature that allows the system to mark memory pages as non-executable. ROP (Return-oriented programming) is an exploit technique that allows an attacker to execute shellcode with protections such as DEP enabled. In this blog post, we will present the reverse engineering process of an application in order to discover a buffer overflow vulnerability and develop an ROP gadgets chain that is used to bypass DEP. We’re planning to write another article …
application blog blog post buffer buffer overflow buffer overflow vulnerability bypass data discover engineering exploit gadgets introduction malware analysis mark memory memory protection non order overflow prevention process programming protection return reverse reverse engineering rop rop gadgets shellcode system vulnerability