Support

  • Why OpSecX
  • Customer Support
OpSecX Navigation

OpSecX

Online Security Education Platform

Home

Shopping Cart

  • $0.00 0 items

Main Menu

  • Online Security Courses
    • View All Courses
    • Automated Mobile Application Security Assessment with MobSF
    • Android Security Tools Expert
    • XSSing JavaScript-MVC Applications
    • Cross Site Scripting (XSS) Attacks for Pentesters
    • Node.js Security: Pentesting and Exploitation
    • WebSecNinja: Lesser Known WebAttacks
    • Windows Exploit Development Megaprimer
    • Mobile Security Bundle
    • Web Security Bundle
  • Services
    • Application Security Services
    • Live Training
      • WebSecNinja 2.0 Live Edition
      • AndroSecNinja Live Edition
      • Mobile Security Framework Live Edition
      • Pentesting modern day application technology stack
  • Resources
    • Blog
    • Security Books
  • My Account
    • Log In
Return to Content

Data Execution Prevention (DEP) Basics

Please purchase the course before starting the lesson.

Lesson tags: bypassing dep, data execution prevention, dep, dep bypass, dep bypass exploit, exploit development, rop chains
Writing an Exploit using Egg Hunter
Bypassing Data Execution Prevention (DEP) using ROP Chains
Back to: Windows Exploit Development Megaprimer – WXP > Advanced Exploit Development in Windows

Windows Exploit Development Megaprimer – WXP

  • Previous
  • Next
  • Basics

  • Buffer Overflow Explained
  • Exploiting Buffer Overflows

  • Vanilla EIP Overwrite
  • Exploiting Vanilla EIP Overwrite
  • Eliminating Bad Character in your Exploit
  • Exploiting Buffer Overflow : Structured Exception Handler (SEH) Overwrite
  • Exploit Development with Mona.py

  • Mona.py - The Exploit Writer's Swiss Army Knife
  • Mona.py - Continuation
  • Converting Exploits to Metasploit Modules with mona.py
  • Advanced Exploit Development in Windows

  • Unicode Based Exploit Development Introduction
  • Unicode Based Exploit Development Continuation
  • Unicode Based Exploit Development Final Thoughts
  • Egg Hunter Basics
  • Writing an Exploit using Egg Hunter
  • Data Execution Prevention (DEP) Basics
  • Bypassing Data Execution Prevention (DEP) using ROP Chains

Copyright © 2024. All Rights Reserved.

OpSecX. | An OpenSecurity Initiative

Privacy Policy | Terms and Conditions | Customer Support | Security