Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the Return-Oriented Programming (ROP) exploitation technique in this 40-minute Hack in Paris conference talk. Learn how ROP bypasses Data Execution Prevention (DEP) more flexibly than return-into-libc exploits and potentially exploits ASLR systems using non-ASLR libraries. Discover practical exploitation examples and gain insights into generating ROP-oriented payloads. Examine existing tools like ROPEme and Immunity Debugger, and get introduced to a new tool designed to streamline the process of creating advanced ROP shellcodes, reducing the manual effort required for payload generation.