Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP

Black Hat via YouTube

Overview

Explore the world of Jump-oriented Programming (JOP) and learn how to bypass Data Execution Prevention (DEP) without using Return-oriented Programming (ROP) in this informative Black Hat conference talk. Discover the JOP ROCKET, a new reverse engineering and exploitation framework that enables the creation of pre-built JOP chains. Gain insights into the practical application of JOP, its advantages over ROP, and how to utilize the JOP ROCKET tool for exploit development. Examine topics such as Job Control Flow, the JOP Rocket interface, manual and automated generation approaches, and handling BadBytes. Presented by Austin Babcock and Bramwell Brizendine, this 37-minute talk provides a comprehensive overview of JOP techniques and tools for cybersecurity professionals and researchers interested in advanced exploit development methods.

Syllabus

Intro
Agenda
Job Control Flow
Job Control Flow Diagram
Job Rocket Overview
Job Rocket Interface
Manual Approach
Automated Generation
BadBytes
Austin

Taught by

Black Hat

Reviews

Start your review of Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.