Bypassing DEP With Jump-Oriented Programming
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Dive deep into the world of Jump-Oriented Programming (JOP) and learn how to bypass Data Execution Prevention (DEP) in this comprehensive 57-minute conference talk from the Hack In The Box Security Conference. Explore the fundamental differences between JOP and Return-Oriented Programming (ROP), and discover why JOP has been largely overlooked in code-reuse attacks. Gain insights into the JOP ROCKET tool, developed by Dr. Bramwell Brizendine, which enables the discovery of dispatcher gadgets and automated construction of complete JOP gadget chains. Understand the nuances and challenges of crafting JOP exploits, including how to avoid using the stack for control flow. Learn about the potential defenses against JOP, such as Control Flow Guard (CFG), and scenarios where JOP attacks may still be effective. Watch live demonstrations of both manual and automated JOP exploit creation, and grasp the practical applications of this advanced exploitation technique in modern Windows environments.
Syllabus
#HITB2021AMS D1T1 - Bypassing DEP With Jump-Oriented Programming - B. Brizendine and A. Babcock
Taught by
Hack In The Box Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network