Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Going Further

Note

This section contains resources for the curious ones. If you want to delve deeper into the session’s topic or find out about its real world implications, you’re in the right place.

ROPes and Ladders

In the real world, buffer overflow exploits are a bit harder. Among other defense strategies, stacks are marked as Non-eXecutable (NX), and Address Space Layout Randomization (ASLR) both make shell code harder to inject, and addresses harder to find.

Here are two consecutive blog posts of a real world attack to give you a more precise idea of the approaches one can take:

  1. ROPing our way to RCE.
  2. No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE.