return-oriented exploitation
Return-oriented exploitation is a technique used in computer security to manipulate a program's execution flow by carefully crafting a series of return instructions in memory, allowing an attacker to execute malicious code without injecting any new code.
Requires login.
Related Concepts (16)
- binary exploitation techniques
- bypassing dep (data execution prevention)
- code reuse attacks
- control flow hijacking
- data-oriented programming
- return-oriented buffer overflow
- return-oriented polymorphism
- return-oriented programming
- return-oriented rootkits
- rop chain construction
- rop gadget extraction
- rop-based sandbox escape
- shellcode injection
- stack pivoting techniques
- stack smashing protection bypass
- stack-based buffer overflow
Similar Concepts
- api exploitation
- backdoor exploitation
- code exploitation
- exploit
- exploit development
- exploit utilization
- exploitation
- exploitation of vulnerabilities
- exploitation techniques
- exploitative tactics
- kernel-level exploitation
- post-exploitation
- return-oriented exploitation techniques
- return-oriented programming attacks
- vulnerability exploitation