Skirack ROP for Masses
Offered By: Hack in Paris via YouTube
Course Description
Overview
Explore the Return-Oriented Programming (ROP) exploitation technique in this 40-minute Hack in Paris conference talk. Learn how ROP bypasses Data Execution Prevention (DEP) more flexibly than return-into-libc exploits and potentially exploits ASLR systems using non-ASLR libraries. Discover practical exploitation examples and gain insights into generating ROP-oriented payloads. Examine existing tools like ROPEme and Immunity Debugger, and get introduced to a new tool designed to streamline the process of creating advanced ROP shellcodes, reducing the manual effort required for payload generation.
Syllabus
08of12 Jean Baptiste Aviat Skirack ROP for masses
Taught by
Hack in Paris
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network