8ksec logo

ARM64 Reversing and Exploitation Part 3 – A Simple ROP Chain | 8kSec Blogs

Return-oriented programming (ROP) allows an attacker to execute code in the presence of security defenses such as executable space protection and code signing using ROP Gadgets. More details about ROP can be found here. In this blog post, we will be writing a ROP Chain for the rop binary. The binaries for this article can be found here. Your […]