Nov. 10, 2023, 4 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Welcome to part 5 of this video series! In this video, we'll discuss what happens after the stack pivot and explore executing code on the stack. We'll also discuss data execution prevention (DEP) and it's impact on our exploitation attempts.

Looking for more content on IDA Pro, check out my course at Pluralsight: https://www.pluralsight.com/courses/ida-pro-concepts-basic-functionality or any of my other courses: https://www.pluralsight.com/authors/josh-stroschein

Videos in this series:
Part 1 - What is a Stack Buffer Overflow? Exploring How To Exploit the Stack …

arbitrary code code code execution data discuss exploitation impact pivot prevention series stack video videos

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Data Privacy Manager m/f/d)

@ Coloplast | Hamburg, HH, DE

Cybersecurity Sr. Manager

@ Eastman | Kingsport, TN, US, 37660

KDN IAM Associate Consultant

@ KPMG India | Hyderabad, Telangana, India

Learning Experience Designer in Cybersecurity (f/m/div.) (Salary: ~113.000 EUR p.a.*)

@ Bosch Group | Stuttgart, Germany

Senior Security Engineer - SIEM

@ Samsara | Remote - US