EvilZone
Welcome,
Guest
. Please
login
or
register
.
1 Hour
1 Day
1 Week
1 Month
Forever
Login with username, password and session length
News:
Home
Help
Search
Login
Register
EvilZone
»
Hacking and Security
»
Tutorials
(Moderator:
TheWormKill
) »
Introduction to return oriented programming (ROP)
Print
Pages: [
1
]
Author
Topic: Introduction to return oriented programming (ROP) (Read 2193 times)
0 Members and 1 Guest are viewing this topic.
kenjoe41
Symphorophiliac Programmer
Administrator
Baron
Posts: 990
Cookies: 224
Introduction to return oriented programming (ROP)
«
on:
May 30, 2013, 10:18:34 pm »
What is ROP?
Return Oriented Programming (ROP) is a powerful technique used to counter common exploit prevention strategies. In particular, ROP is useful for circumventing Address Space Layout Randomization (ASLR)1 and DEP2. When using ROP, an attacker uses his/her control over the stack right before the return from a function to direct code execution to some other location in the program. Except on very hardened binaries, attackers can easily find a portion of code that is located in a fixed location (circumventing ASLR) and which is executable (circumventing DEP). Furthermore, it is relatively straightforward to chain several payloads to achieve (almost) arbitrary code execution.
Read more:
http://codearcana.com/posts/2013/05/28/introduction-to-return-oriented-programming-rop.html
«
Last Edit: May 30, 2013, 10:20:53 pm by kenjoe41
»
Report to moderator
Logged
If you can't explain it to a 6 year old, you don't understand it yourself.
http://upload.alpha.evilzone.org/index.php?page=img&img=GwkGGneGR7Pl222zVGmNTjerkhkYNGtBuiYXkpyNv4ScOAWQu0-Y8
[<NgGw/hsq]>EvbQrOrousk[/img]
Print
Pages: [
1
]
EvilZone
»
Hacking and Security
»
Tutorials
(Moderator:
TheWormKill
) »
Introduction to return oriented programming (ROP)