Session 11 – Practical Reversing Part VI – Exploit Development [advanced]

This session discussed some of the protections added by the operating system and processors to mitigate the exploitation, and also presented some ways to bypass those protections.

 

DemoVideo 1: Heap Spray 

DemoVideo 2: Bypassing DEP

 

Share:

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.