Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the Return-Oriented Programming (ROP) exploitation technique in this 40-minute Hack in Paris conference talk. Learn how ROP bypasses Data Execution Prevention (DEP) more flexibly than return-into-libc exploits and potentially exploits ASLR systems using non-ASLR libraries. Discover practical exploitation examples and gain insights into generating ROP-oriented payloads. Examine existing tools like ROPEme and Immunity Debugger, and get introduced to a new tool designed to streamline the process of creating advanced ROP shellcodes, reducing the manual effort required for payload generation.