Welcome to 'Information Security 5 Secure Systems Engineering' course !
This lecture demonstrates a Return-Oriented Programming (ROP) attack. Witness the process of finding ROP gadgets in a program binary and chaining them together to achieve a specific goal.
NPTEL Courses permit certifications that can be used for Course Credits in Indian Universities as per the UGC and AICTE notifications.
To understand various certification options for this course, please visit [ Ссылка ]
#ROPGadgets #ReturnOrientedProgramming #ROPAttacks #ExploitDemonstration
Ещё видео!