Description: Slide : - http://www.hackinparis.com/slides/hip2k11/08-Skyrack.pdf
The ROP exploitation technique allows to bypass DEP in a more flexible way than return-into-libc exploits. In some cases, ASLR systems can also be exploited when using non ASLR libraries.
This presentation will introduce the ROP exploitation technique by showing practical exploitation examples.
Today, only a few tools allow to help generating ROP oriented exploitation tools. ROPEme does it on Linux, Immunity Debugger may help to generate gadgets, but none of these tools can be easily used to perform advanced ROP shellcodes.
This presentation will introduce all along a tool which helps to reduce the human effort needed to generate such payloads.
Tags: securitytube , Confidence , hacking , hackers , information security , convention , computer security , hack-in-the-paris-11 , hack-in-the-paris-2011 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.