return-oriented programming
Return-oriented programming (ROP) is a technique used in computer security where an attacker repurposes existing code sequences, called gadgets, to alter the control flow of a program. By carefully selecting and chaining these gadgets, an attacker can execute malicious actions without injecting new code, making it difficult to detect and mitigate.
Requires login.
Related Concepts (24)
- address space layout randomization (aslr)
- buffer overflow attacks
- canary values
- code injection
- control flow hijacking
- control-flow hijacking mitigations
- control-flow integrity
- control-flow integrity bypass
- data execution prevention
- exploit writing techniques
- heap spraying
- kernel shellcode
- memory corruption vulnerabilities
- non-executable stack
- return-oriented exploitation
- return-oriented exploitation techniques
- return-to-libc attacks
- reverse engineering techniques for buffer overflows
- rop gadget
- shellcode
- smashing the stack
- stack corruption
- stack pivot
- stack smashing
Similar Concepts
- advanced return-oriented programming (arop)
- data-oriented programming
- data-oriented programming (dop)
- jump-oriented programming
- metaprogramming
- object-oriented programming
- return oriented programming (rop)
- return-oriented polymorphism
- return-oriented programming (rop)
- return-oriented programming (rop) attacks
- return-oriented programming (rop) mitigation
- return-oriented programming (rop) prevention
- return-oriented programming attacks
- return-oriented programming with gadgets (ropgadget)
- rop (return-oriented programming)