Binary Exploitation: Data Execution Prevention
And how attackers can bypass DEP to achieve code execution.
Hey, y’all! Welcome back to the binary exploitation series. So far, we’ve delved into some exploitation techniques such as buffer overflow, buffer overread, and format string attacks.