Nov. 5, 2023, 6:47 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

In this video, part 5 of the series, we'll talk about how to perform a "stack pivot". We've gained control of EIP through our payload, but how do we tell the instruction pointer how to pivot to execute code on the stack? We'll also discuss data execution prevention, or DEP, and how it was designed to mitigate exploitation techniques such as this. We'll talk through steps on how to disable it and make a few modifications to our binary of …

code control data discuss payload performing pivot prevention series stack video

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Offensive Security Engineer

@ Ivanti | United States, Remote

Senior Security Engineer I

@ Samsara | Remote - US

Senior Principal Information System Security Engineer

@ Chameleon Consulting Group | Herndon, VA

Junior Detections Engineer

@ Kandji | San Francisco

Data Security Engineer/ Architect - Remote United States

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700