Follow

This great video by Andreas Kling shows how exploitation on systems without ASLR (or an improper implementation) makes exploitation of user-land programs easy. Exploit code can re-use hardcoded addresses. Later exploits can copy/paste addresses en masse.

youtube.com/watch?v=LORxdO1XUj

· · Web · 0 · 2 · 3
Sign in to participate in the conversation
BSD Network

bsd.network is a *BSD-adjacent Mastodon Instance. We have a code of conduct.