Cybersecurity Fundamentals — Hard
Key points
- ROP involves chaining small code snippets together
- It uses existing code snippets (gadgets) to perform operations
- ROP bypasses non-executable memory protections like DEP/NX
- The technique does not involve injecting new code
Ready to go further?
Related questions
