This session discussed some of the protections added by the operating system and processors to mitigate the exploitation, and also presented some ways to bypass those protections.
DemoVideo 1: Heap Spray
DemoVideo 2: Bypassing DEP
This session discussed some of the protections added by the operating system and processors to mitigate the exploitation, and also presented some ways to bypass those protections.
DemoVideo 1: Heap Spray
DemoVideo 2: Bypassing DEP