Description: This video demos the Retn Oriented Programming (ROP) technique to call VirtualProtect method and allocates space on the stack to execute a payload. This technique is used to by pass the hardware Data Execution Prevention (DEP) technique implemented by windows operating system. Currently the video does not have sound, but a new video can be provided if people want it.
Hey guys if you are interested, one of my friends has released a new book that teaches about Windows stack exploitation, specifically focusing on ways to bypass the various security protections such as SafeSEH, Hardware DEP, ASLR, etc. The book is a detailed tutorial that not only teaches to bypass these protections but also teaches reverse engineering and fuzzing techniques to actually find security issues in the Windows applications.
Overall one of the really good books out there on this subject.
Here is the link
http://www.amazon.com/Windows-Stack-Exploitation-Samuel-Huntley/dp/1507821158/ref=sr_1_1?ie=UTF8&qid=1423712250&sr=8-1&keywords=Windows+stack+exploitation
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.