Skirack ROP for Masses
Offered By: Hack in Paris via YouTube
Course Description
Overview
Explore the Return-Oriented Programming (ROP) exploitation technique in this 40-minute Hack in Paris conference talk. Learn how ROP bypasses Data Execution Prevention (DEP) more flexibly than return-into-libc exploits and potentially exploits ASLR systems using non-ASLR libraries. Discover practical exploitation examples and gain insights into generating ROP-oriented payloads. Examine existing tools like ROPEme and Immunity Debugger, and get introduced to a new tool designed to streamline the process of creating advanced ROP shellcodes, reducing the manual effort required for payload generation.
Syllabus
08of12 Jean Baptiste Aviat Skirack ROP for masses
Taught by
Hack in Paris
Related Courses
NetflOSINT- Taking an Often-Overlooked Data Source and Operationalizing It - Joe Gray - Hack in ParisHack in Paris via YouTube All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon Brizinov - Hack in Paris - 2021
Hack in Paris via YouTube Exploits in Wetware - R. Sell - Hack in Paris - 2019
Hack in Paris via YouTube All Your GPS Trackers Belong to Us - C. Kasmi, P. Barre - Hack in Paris - 2019
Hack in Paris via YouTube In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019
Hack in Paris via YouTube