Abstract

We would be skimming through many other binary exploitation techniques and their mitigation techniques employed before Return oriented Programming. The other exploitation techniques would involve -
Return Stack Pointer
SEH Overwrite

Mitigation techniques would involve -

Stack cookie prevention
NX
DEP

We would then be looking at the exploitation technique and mitigation for -
ROP
If time permits, we would also be looking at a DEMO and live exploitation of the stack using Return Oriented Programming

This is another link to the reference for the Presentation
https://www.slideshare.net/MihirShah247/rop-123230720

Speaker

Mihir Shah

Timing

Starts at Saturday November 17 2018, 01:25 PM. The sessions runs for 40 minutes.

Resources