Finance Certifications Goldman Sachs & Amazon Teams Trust
Google, IBM & Microsoft Certificates — All in One Plan
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the world of Jump-oriented Programming (JOP) and learn how to bypass Data Execution Prevention (DEP) without using Return-oriented Programming (ROP) in this informative Black Hat conference talk. Discover the JOP ROCKET, a new reverse engineering and exploitation framework that enables the creation of pre-built JOP chains. Gain insights into the practical application of JOP, its advantages over ROP, and how to utilize the JOP ROCKET tool for exploit development. Examine topics such as Job Control Flow, the JOP Rocket interface, manual and automated generation approaches, and handling BadBytes. Presented by Austin Babcock and Bramwell Brizendine, this 37-minute talk provides a comprehensive overview of JOP techniques and tools for cybersecurity professionals and researchers interested in advanced exploit development methods.
Syllabus
Intro
Agenda
Job Control Flow
Job Control Flow Diagram
Job Rocket Overview
Job Rocket Interface
Manual Approach
Automated Generation
BadBytes
Austin
Taught by
Black Hat