Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the world of Jump-oriented Programming (JOP) and learn how to bypass Data Execution Prevention (DEP) without using Return-oriented Programming (ROP) in this informative Black Hat conference talk. Discover the JOP ROCKET, a new reverse engineering and exploitation framework that enables the creation of pre-built JOP chains. Gain insights into the practical application of JOP, its advantages over ROP, and how to utilize the JOP ROCKET tool for exploit development. Examine topics such as Job Control Flow, the JOP Rocket interface, manual and automated generation approaches, and handling BadBytes. Presented by Austin Babcock and Bramwell Brizendine, this 37-minute talk provides a comprehensive overview of JOP techniques and tools for cybersecurity professionals and researchers interested in advanced exploit development methods.
Syllabus
Intro
Agenda
Job Control Flow
Job Control Flow Diagram
Job Rocket Overview
Job Rocket Interface
Manual Approach
Automated Generation
BadBytes
Austin
Taught by
Black Hat
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam